...
 
 
Site Search
 

Summary of Categories of Data Use by Category

Data Category Explanation Categories of Purposes
PII Personally Identified Information or PII is information that directly identifies or is used to identify a specific individual, including name, address, telephone number, email address, and in specific, limited cases, government identifiers.
  • To provide our products and services as further described in our Privacy Statement; including: Marketing Solutions; Risk Solutions; Communications Solutions; Security Solutions; Registry Solutions; and Professional Services
  • As a data processor, at the direction of our business customers, and in accordance with their own privacy policies
  • To fulfill your requests
  • For internal use, research, fraud prevention and detection, and product development
  • To identify and respond to security threats or other criminal behavior and to protect our rights and the rights of third parties
  • In response to and support of law enforcement investigations
  • To (i) comply with US or foreign laws or to respond to lawful requests and legal process in US or foreign civil, criminal or investigative matters, (ii) enforce agreements, our terms and conditions, and policies, and protect our rights and property as the site owner, and (iii) in an emergency to protect the personal safety of Neustar, its customers, or any person
  • With third party vendors, consultants and other service providers who are working on our behalf, but we limit their access and use of PII to that which is needed to carry out their work for us
  • In connection with any merger/sale of company assets, etc.
CRM Customer Relationship Management or "CRM" Data is the data and information associated with a company's relationship with customers throughout the customer lifecycle, and may include PII and/or Pseudonymous IDs, along with demographic, behavioral, contextual, attribute, and inferential data about their customers and prospects. CRM Data may reflect a consumer's online and/or offline interactions with a particular advertiser, publisher, or retailer. This information is usually pseudonymized for use in connection with Neustar's online services, meaning it cannot be used to identify you without additional data, and we use technical and organization measures to segregate the data and prevent unauthorized identification of individuals.
  • As a data processor, at the direction of our business customers, and in accordance with their own privacy policies;
  • Where permitted by our customer agreements, for internal use, research, fraud prevention and detection, and product development
  • To (i) comply with US or foreign laws or to respond to lawful requests and legal process in US or foreign civil, criminal or investigative matters, (ii) enforce agreements, our terms and conditions, and policies, and protect our rights and property as the site owner, and (iii) in an emergency to protect the personal safety of Neustar, its customers, or any person
  • With third party vendors, consultants and other service providers who are working on our behalf, but we limit their access and use of PII to that which is needed to carry out their work for us
Pseudonymous IDs Pseudonymous IDs includes information linked to DIIs (Device Identifiable Data) such as Cookies, MAIDs (Mobile Advertising IDs), Statistical/Probabilistic IDs, IP Addresses, and other third-party identifiers, including TV identifiers. Pseudonymous IDs do not, by themselves, identify a specific individual, but can be combined with other information for that purpose.
  • To provide our products and services as further described in our Privacy Statement; including: Marketing Solutions; Risk Solutions; Communications Solutions; Security Solutions; Registry Solutions; and Professional Services
  • As a data processor, at the direction of our business customers, and in accordance with their own privacy policies
  • To fulfill your requests
  • For internal use, research, fraud prevention and detection, and product development
  • To identify and respond to security threats or other criminal behavior and to protect our rights and the rights of third parties
  • In response to and support of law enforcement investigations
  • To (i) comply with US or foreign laws or to respond to lawful requests and legal process in US or foreign civil, criminal or investigative matters, (ii) enforce agreements, our terms and conditions, and policies, and protect our rights and property as the site owner, and (iii) in an emergency to protect the personal safety of Neustar, its customers, or any person
  • With third party vendors, consultants and other service providers who are working on our behalf, but we limit their access and use of PII to that which is needed to carry out their work for us
  • In connection with any merger/sale of company assets, etc.
Attribute Data Neustar collects and aggregates consumer survey data, household/neighborhood level demographic data, purchasing data, and third-party licensed purchasing and lifestyle data to make predictions about the preferences and interests of large groups of similar consumers. Our customers may use insights derived from their own CRM Data or licensed from reputable third parties on our platforms, including, without limitation, geolocation data collected by mobile application providers. In addition, Generally, Attribute Data takes the form of a numeric or alpha-numeric code that corresponds to a market category or segment.
  • To provide our products and services as further described in our Privacy Statement; including: Marketing Solutions; Risk Solutions; Communications Solutions; Security Solutions; Registry Solutions; and Professional Services
  • As a data processor, at the direction of our business customers, and in accordance with their own privacy policies
  • Where permitted by our customer agreements, for internal use, research, fraud prevention and detection, and product development
  • In response to and support of law enforcement investigations;
  • To (i) comply with US or foreign laws or to respond to lawful requests and legal process in US or foreign civil, criminal or investigative matters, (ii) enforce agreements, our terms and conditions, and policies, and protect our rights and property as the site owner, and (iii) in an emergency to protect the personal safety of Neustar, its customers, or any person;
  • With third party vendors, consultants and other service providers who are working on our behalf, but we limit their access and use of PII to that which is needed to carry out their work for us; and
  • In connection with any merger/sale of company assets, etc.
Geolocation Data Geolocation Data is information about the location of an individual or device derived through IP address and/or location-based services such as GPS level latitude-longitude coordinates or Wi-Fi triangulation
  • To provide our products and services as further described in our Privacy Statement; including: Marketing Solutions; Risk Solutions; Communications Solutions; Security Solutions; Registry Solutions; and Professional Services
  • As a data processor, at the direction of our business customers, and in accordance with their own privacy policies
  • To fulfill your requests
  • For internal use, research, fraud prevention and detection, and product development
  • To identify and respond to cyber security threats or other criminal behavior and to protect our rights and the rights of third parties
  • In response to and support of law enforcement investigations
  • To (i) comply with US or foreign laws or to respond to lawful requests and legal process in US or foreign civil, criminal or investigative matters, (ii) enforce agreements, our terms and conditions, and policies, and protect our rights and property as the site owner, and (iii) in an emergency to protect the personal safety of Neustar, its customers, or any person
  • With third party vendors, consultants and other service providers who are working on our behalf, but we limit their access and use of PII to that which is needed to carry out their work for us
  • In connection with any merger/sale of company assets, etc.
Log Data Log Data is information that is collected and logged in the ordinary course of operating our business, and may include standard Internet Log Data, Event Data, and/or Service Data:
  • Internet Log Data. Standard Internet Log Data includes the Internet page request that is automatically collected when you visit a website, the URL of the page requested, IP Address, browser type, browser language, configuration settings, operating system information, mobile service provider, search terms, date and time stamps, and Pseudonymous IDs such as Cookies and service specific information such as Event Data and Service Data.
  • Event Data. We collect information about ads you see (advertiser ID, campaign ID), where and when you see the ad (date/time stamp, URL), and how you react to the ads you see (click, hover, convert, etc.). This information may be associated with Pseudonymous IDs such as DII and other pseudonymous data such as Log Data and Attribute Data.
  • Service Data. Neustar collects certain data, not described above, in the course of providing products and services to our business customers and to the public. For example, when you browse the World Wide Web you rely on the Domain Name System or DNS to translate the website name you type to an Internet Protocol or IP Address. Neustar provides both public and private DNS services, and when you use our Internet address resolution services we may collect the IP Address of the computer you are using, the domain name requested and the associated IP Address, the request type (IPv4, IPv6, NS, MX, TXT, etc.), ISP information, geolocation information, and other technical information.
  • To provide our products and services as further described in our Privacy Statement; including: Marketing Solutions; Risk Solutions; Communications Solutions; Security Solutions; Registry Solutions; and Professional Services
  • As a data processor, at the direction of our business customers, and in accordance with their own privacy policies
  • For internal use, research, fraud prevention and detection, and product development
  • To identify and respond to cyber security threats or other criminal behavior and to protect our rights and the rights of third parties
  • In response to and support of law enforcement investigations
  • To (i) comply with US or foreign laws or to respond to lawful requests and legal process in US or foreign civil, criminal or investigative matters, (ii) enforce agreements, our terms and conditions, and policies, and protect our rights and property as the site owner, and (iii) in an emergency to protect the personal safety of Neustar, its customers, or any person
  • With third party vendors, consultants and other service providers who are working on our behalf, but we limit their access and use of PII to that which is needed to carry out their work for us
  • In connection with any merger/sale of company assets, etc.