Note that Ignite updates these terms from time to time. The last update was July 14th, 2022.
Information you provide us or information we register about you when using our Services will be used solely for legitimate purposes and in accordance with applicable privacy policies. We safeguard your privacy and the security associated with the use of your information.
You can make inquiries regarding the processing of personal data to us.
We use your personal data:
We use personal data solely for processing purposes that have a valid processing basis. Selected types of data processing require your consent.
We are a data processor for all customers who enter into a license agreement for the use of our digital applications for strategic procurement. For this type of agreement, we sign a separate data processing agreement («DPA») with the customer.
We gather information from different sources to fulfil the purposes described above. These sources can be divided into two main categories:
If you use the Services, you provide information about but not limited to:
You may also provide us additional information when using the Services, e.g. if you choose to enter into a license agreement with us.
When you use a Service, we use different technologies to recognize and learn more about you as a user - both on the website and through the use of our digital applications for strategic procurement. The information we collect may include operating system information, browser versions, IP addresses, identifiers from your browser, and user behaviour (e.g. time usage and page views).
If you have signed up or registered for the use of our Services through consent, you will receive relevant information and content unless you have unsubscribed from the Services in later correspondence.
Only Ignite Procurement employees have access to the information. We do not sell or rent your information to third parties.
Your information may also be disclosed in statutory cases, as part of the payment (debt collection), for accounting purposes, or as a result of orders from relevant public authorities.
You can share information from our Services on social media, such as Facebook, LinkedIn, and Instagram. If you choose to share information in social media, these media may be able to collect information about your activity on the Service. Ignite Procurement has no control or responsibility for how social media uses personal data they gather about you.
We use the following services to analyze the use of our Services and to provide targeted marketing and advertising for the use of our Services:
Google Analytics: Collect and analyze data about how website visitors use the Services. Read more about this on Google’s website.
HubSpot: Processing of customer information, communication and providing the Services, as well as marketing and analysis of how website visitors use the Services. Read more about this on Hubspot’s website.
Facebook Pixel: Collect and analyze data related to marketing and advertising on Facebook, such as conversion tracking and website visitors. Read more about this on Facebook’s website.
Linkedin Insight Tag: Collect and analyze data related to marketing and advertising on LinkedIn, such as conversion tracking and website visitors. Read more about this on LinkedIn’s website.
Google Ads Conversion Tracking: Collect and analyze data related to marketing and advertising on Google Ads, such as conversion tracking and website visitors. Read more about this on Google’s website.
Intercom: Processing of user information and customer support, as well as data and user behavior analytics, for the users of our digital applications for strategic procurement. Read more about this on Intercom's website.
Hotjar: Collect and analyze data on how website visitors use the Services. Read more about this on Hotjar's website.
Dreamdata: Collect and analyze data about how website visitors use the Services, from which channel they entered the website and which pages are most relevant to them. Read more about this on Dreamdata's website.
All IP addresses are anonymized in the services we use.
You can prevent cookies from being stored on your computer by changing the settings in your browser. However, this may affect the functionality and quality of the Services.
We work continuously to safeguard our customers’ privacy. Our security work includes work on IT infrastructure, personnel training and security of premises and equipment.
Ignite Procurement shall ensure that information collected is not used in contravention of the purpose for which they are collected and the terms and conditions available at any given time.
Ignite Procurement has established both technical and organizational procedures and measures to ensure that unauthorized persons do not access your personal data. Examples of such measures are risk assessments, DPAs, various procedures for data processing and follow-up of requests related to access, correction, barring and deletion, see section 10 below.
It is important that you safeguard your password in our digital applications for strategic procurement, in addition, to protecting your mobile phone, PC and tablet with passwords or similar identity checks. This is your responsibility.
Note that user information in our digital applications for strategic procurement will be deleted in accordance with the signed license agreement for your company.
We may block your user access to the solution if we have reason to suspect fraud or breach of the terms in accordance with the license agreement.
In some cases, we may request your consent to retain information for a longer time period. In such cases, we will inform you about the processing purpose for keeping the information. For example, the purpose may be to keep your contact information after you unsubscribe from our newsletter.
The Norwegian Personal Data Act gives you privacy rights that you may exercise in different manners. Your rights include being able to:
You can make inquiries regarding the processing of personal data to us. To ensure that personal data is handed to the right person, we may require that a request for access be made in writing or that the identity is otherwise verified.