3.1 Use of data: Blue Mountain uses your data to provide the Blue Mountain Application to you. Our privacy policy is an important part of these terms and describes in more detail how we deal with personal data, like your name and email address.
3.2 Use of data: When you enter or upload your data into the Blue Mountain Application, we do not own that data but you grant us a licence to use, copy, transmit, store, query, analyse, and back up all data you submit to us through the Blue Mountain Application, including personal data of yourself and others, to: enable you to use the Blue Mountain Application; allow us to improve, develop and protect the Blue Mountain Application; create new services; communicate with you about your subscription; and send you information we think may be of interest to you based on your marketing preferences.
3.3 Use of your own personal data: We respect your privacy and take data protection seriously. In addition to these terms, our privacy policy sets out in detail how we process your own personal data that you enter into Blue Mountain, like your name and email address.
3.4 Use of personal data you enter about others: Depending on where your contacts are based, our data processing terms may also apply to the personal data of others (such as your customers, suppliers and employees) that you enter into Blue Mountain.
3.5 Anonymised statistical data: When you use the Blue Mountain Application, we may create anonymised statistical data from your data and usage of the Blue Mountain Application, including through aggregation. Once anonymised, we may use it for our own purposes, such as to provide and improve the Blue Mountain Application, to develop new services or product offerings, to identify business trends, and for other uses we communicate to you.
3.6 Data breach notifications: Where we think there has been unauthorised access to personal data inside your subscription, we will let you know and give you information about what has happened. Depending on the nature of the unauthorised access, and the location of your affected contacts, you may be required to assess whether the unauthorised access must be reported to the contact and/or a relevant authority. We think you are best placed to make this decision, because you will have the most knowledge about the personal data stored in your subscription.