Privacy Policy
Broken Links Checker by XLogic Solutions
Introduction
This Privacy Policy pertains to the processing of information by Broken-Links-Checker.net. When you see “we, us, or our” in this policy, it refers to Broken Links Checker and Xlogic Solutions and its products. If you are using our services, it means you are giving your consent to the Processing of your data as outlined in this privacy policy.
Our privacy policy applies only to our products and services, not to other organizations or companies that advertise Xlogic Solutions products and services. If we are involved in the sale of assets or a merger (although we are not currently planning such an activity), we will provide you with notification before any such action. In this situation, your personal information will be subject to a different privacy policy.
Interpretation
In our privacy policy, here is an explanation of some important terms:
- Laws for Data Protection: It means all regulations, laws, rules, guidelines, interpretations, and codes issued by an official authority in any part of the world that pertain to the privacy and protection of personal data, including but not limited to the Personal Data Protection Act 2012, the Regulation (EU) 2016/679 (General Data Protection Regulation).
- Data Subject: We define a data subject as someone who can be identified and whose data we process.
- Personal Data: Includes all data, whether verified or not, that can be linked to a person’s identity using the information Broken-Links-Checker.net holds or could reasonably access and is treated as personal data by law.
- Processing: Includes a wide range of operations on Personal Data, like gathering, using, recording, adapting, combining, disclosing, transferring, or permanently deleting the data.
What do we collect from you?
We collect data for our website and Xlogic Solutions tools and services, which may include personal information about our visitors. The details we collect and process may depend on how you are using our services. We collect data, store it, and assign unique tags to it based on the device, application, and browser you are using. These may include:
Data is collected automatically through the following means:
- Information of Mobile Network: Phone number, carrier, IP address, time, referral URL, data and other access requests, time zone, access status, HTTP status code, data volume, data transferred, the website from which you are directed, the website you try to access by leaving us and UUID (universally unique identifier).
- Browser information: settings, type, and version.
- Device information: operating system and type.
Information of Mobile Network We May Collect:
- Phone number
- Mobile carrier (e.g., network provider)
- IP address
- Access time and date
- Referral URL (the website that led you to us)
- Data and other access requests
- Time zone settings
- Access status (e.g., granted, denied)
- HTTP status code (response from the server)
- Data volume accessed or requested
- Amount of data transferred
- The website you came from
- The website you go to after leaving ours
- UUID (Universally Unique Identifier)
We use cookies, beacons, and similar technologies to collect data, such as:
- Websites/web pages visited
- Access time, frequency, and duration of visits
- Links clicked and user interaction with advertisements
- User segment or category (based on behavior or profile)
- IP address
- Device model or type
- Operating system and version
- Browser type and settings
- Identifiers (e.g., device ID, advertisement ID, individual device token)
- Cookie-related data (e.g., cookie ID)
We may contact you via social media or email, such as your account IDs on social media, email addresses, social media profiles, or any messages you have sent to Xlogic Solutions or Broken-Links-Checker.net. You can ask any question or ask for customer support. Our customer support team may also request some information related to your request.
Why do we process your information?
We collect your data and process your information for the following purposes:
- For account management and user registration: you create an account with Xlogic Solutions services and include your contact details. We need to process information to execute your account creation process, authentication, and setting customization;
- Providing accessburgo access to features and tools: To operate, maintain, deliver, and improve the services provided by Broken Links Checker and XLogics Solutions. This includes providing reliable access to tools such as link analysis, PDF, and image-to-QR code generators, as well as related digital utilities. It also involves performance monitoring, uptime management, spam prevention, database administration, and the use of hosting and backend infrastructure to ensure the stability, speed, and security of our platform;
- Creation and assessment of user behavior metrics: It means collecting and analyzing information following the Xlogic Solutions for internal and external use of services by authorized parties, and showing general preferences trends;
- Refining existing services based on user feedback: We process your information to develop new tools, products, services, and upgrades to current products, such as improving our tools and AI models;
- Marketing Communications: For communication of advertising and marketing information, such as personalized content according to the information we collected;
- Customer Support: We need and process data for accurate customer communications because we want to notify our customers about changes to Xlogic Solutions services, tools, and Broken-Links-Checker.net, handling complaints and queries, along with other customer service interactions;
- Security and Fraud Prevention: We process your information to improve the security and safety of Xlogic Services, including undertaking important measures to prevent fraud, authentication measures for the prevention of unauthorized access;
- Acting in accordance with legal responsibilities: We want to fulfill all legal obligations, such as cooperation and participation with investigations and proceedings, such as judicial proceedings conducted by government or public authorities for investigating, prosecuting, and detecting concerning our sole wariness and relevance;
- Cookies, web beacons, and related tools: We wish to provide a valuable and personalized user experience. It helps us improve our services; and
- Any other reason we inform you about through official communication.
Transfer and Disclosure of Personal Information
We may disclose or transfer information to someone for a specific purpose. Let’s understand this provision:
Data Disclosure to Authorized Partners
We work with various third parties and may transfer or disclose the collected information to them. This may include your personal data, and we do this for your benefit only. Here is a list of these parties:
- Payment Services: We may utilize third-party services for processing monetary transactions related to certain of our services. In this situation, your information is also subjected to the privacy policy of the payment service provider;
- Sponsors, advertisers, and partners: We may work with someone in a contractual capacity to publish, share, and promote content according to Broken Links Checker and Xlogic Solutions services;
- Subsidiaries and associated entities of XLogics: All entities affiliated or related to Xlogic Solutions include any subsidiary, holding company, partnership, related corporation, and joint venture entity of our company;
- Data processors: Before giving your information to a third-party to process, we share appropriate instructions for the processing of your data, including administrative and IT services (maintenance and hosting of IT systems). There are contractual obligations for data processors to implement proper organizational and technical security measures for the protection of your data and to process your information as instructed;
- System administrators for your domain: Parties responsible for administering the Broken-Links-Checker.net account you’re associated with—often your company or employer;
- Authorized service providers: These are third-party entities or service providers who are tied in a contractual association with Xlogic Solutions to provide support to our tools and services; and
- Regulatory bodies, judicial authorities, professional advisors, and similar parties: These are organizations or public regulatory bodies that are permitted to work with us to provide consultancy and advisory services. We are in a contract with them.
- For any purpose disclosed to you through formal written notice.
Note: We work with third-party entities for different purposes. They can be advisors, service providers, or domain managers. They have a privacy policy in place for the transfer and sharing of information. Their information process may be subject to their own terms and privacy policy.
Additional Uses of Your Information (With Prior Notice)
For Xlogics Solutions and Broken-Links-Checker.net, we may also use your data for:
- New features or services we notify you about.
- Future updates or integrations will be shared via email or posted as a notice.
- Tech improvements requiring prior awareness.
- Research or testing with prior written notice.
- Beta tools or pilot programs with consent.
- Internal audits or quality checks, pre-shared.
- Legal or security compliance updates, communicated.
- Personalized offers or feature alerts, once notified.
- UX/UI improvements shared in user messages.
- Any lawful purpose disclosed through official notice.
International Data Transfers
- We may transfer, store, or process your personal data outside your country to provide reliable services.
- These transfers may involve countries where our servers, cloud providers, or partners operate. And their data protection laws can be different.
- We use legal mechanisms (e.g., standard contractual clauses) to protect your data during international transfers.
- By using our services, you agree to the transfer of your data to countries with less stringent data protection laws.
- We ensure your data is handled securely, lawfully, and transparently at all times.
Data Holding and Retention Policies
We retain your data for research and development purposes. If we no longer need your data in accordance with our policies, we will delete it. Moreover, if you choose to delete your account, we will also delete your data. We store information to ensure security, prevent abuse, and fraud.
Legal Grounds Underlying Data Processing Activities
- Contractual necessity: To provide you with services or products you’ve registered for or agreed to. We process your data if necessary to improve our service.
- Legal obligation: To comply with applicable laws and regulatory requirements. If we are required to comply with the law in processing your data, we will do so.
- Legitimate interest: To operate and improve our services, unless your rights override those interests. When processing data, we will not go against your legitimate interests.
- Consent: When you have explicitly agreed, especially for communications and marketing. We always prefer to get your permission before initiating data processing activities.
How do we use cookies, web beacons, analytics, and similar elements?
We use cookies and similar technologies to remember your preferences. When you visit our tool or website, we and our selected third-party partners may track your data using cookies and similar technologies to provide a better and faster experience.
Remember, our cookies are not dangerous. These are small text files created by your browser and stored on your device. We use these cookies for one session only, along with persistent cookies that remain on your device for longer to help us remember you.
Our cookies, web beacons, and similar technologies serve the following purposes:
- To activate the necessary provisions of your services and website.
- For a better user experience, such as saving font size and data entered in a form, and
- To improve our services, tools, and website (such as evaluating loading times and error messages.
Data Security
Your Personal Data may be transferred to and retained on servers located in the United States, where our operations are based.
We use Cloudflare to encrypt your personal data as it is transmitted from our servers to your browser. Our database backups are encrypted and secure. For more information, you can check out the Privacy Policy of Cloudflare https://www.cloudflare.com/privacypolicy/, which will help you know how Cloudflare handles your data.
When the data is live in the database, it may not be encrypted. Therefore, we follow industry best practices and take all necessary precautions to protect your data. Our purpose is to protect your data against disclosure, access, alteration, misuse, loss, or destruction for various reasons. However, our storage is entirely secure, and there is no illegitimate method of electronic data transmission. If you become aware of any data breach or vulnerable practices related to data, please contact us immediately using the contact details provided. We will deeply investigate these incidents.
User Rights and Data Control Options
With us, your rights regarding data protection are completely secure. You are entitled to the following rights for your information:
- Right to Access: You have the right to request confirmation and access to the personal data we process about you.
- Right to Rectification: You have a right to request corrections to inaccurate or incomplete personal data.
- Right to Erasure (Right to Be Forgotten): Ask us to delete your personal data, fully or partially.
- Right to Restrict Processing: Limit how we use your personal data for specific purposes.
- Right to Data Portability: Request your personal data in a machine-readable format and transfer it to another service.
- Right to Object: Object to the processing of your data for certain purposes at any time.
- Right to Withdraw Consent: Withdraw your consent to data processing at any time (does not affect past processing).
- Right to Appeal: Appeal our refusal of a rights request and have it reconsidered.
- Right to Lodge a Complaint: File a complaint with the appropriate data protection authority.
Contact us at support@broken-links-checker.net; we may ask for verification.
Category of Personal Information
Category of Personal Information | Do We Collect? | Source | Do We Disclose? | If Yes, To Whom & For What Purpose |
---|---|---|---|---|
Identifiers (e.g., name, email, IP address, account name) | Yes | Directly from user interactions on our website or tools | Yes | - Service providers (for analytics, security, and infrastructure) - Cloud hosting platforms (to operate services) - Transaction partners (for service usage records) |
Customer Records (e.g., contact details, support history) | Yes | Directly from users when submitting inquiries or using tools | Yes | - CRM and support vendors (for responding to user requests) - Internal teams (for performance improvement and audits) |
Commercial Information (e.g., usage logs, tool access history, service preferences) | Yes | Directly from tool usage and site activity | Yes | - Analytics services (for improving product features) - Marketing platforms (only with anonymized or aggregated data) |
Internet or Network Activity (e.g., IP address, pages visited, tool behavior) | Yes | Indirectly via cookies, analytics, and server logs | Yes | - Analytics tools like Google Analytics or Matomo (for usage tracking) - Security vendors (for fraud detection) |
Geolocation Data (approximate location from IP) | Yes | Indirectly from IP address | No | – |
Visual or Audio Data (e.g., uploaded images in QR code/image tools) | Yes | Uploaded by users voluntarily | Yes | - Only shared with user permission (e.g., for display via generated QR codes) - May be hosted securely via cloud storage |
Professional or Employment Data (e.g., business email for enterprise users) | Yes | Directly from users signing up with business credentials | No | – |
Educational Information | No | – | No | – |
Inferences or Profiles (e.g., usage patterns to improve service) | Yes | Generated internally through behavior analytics | Yes | - Internal teams (for feature enhancement) - Personalization engines (if user has opted in) |
How do we handle sensitive personal data?
Category of Sensitive Personal Information | Did We Collect? If So, From What Source? | Did We Disclose? If So, To Whom and For What Purpose? |
---|---|---|
Account login credentials (e.g., username, password, or access keys) | Yes, directly from users during registration or login | Yes, to secure IT service providers for authentication, account protection, and fraud prevention. |
Device identifiers tied to user accounts (e.g., UUIDs or session tokens) | Yes, collected automatically through browser/device interactions | Yes, to analytics and infrastructure partners for maintaining secure and consistent user sessions. |
IP address in combination with access credentials | Yes, automatically during login or account activity | Yes, to hosting and security providers for threat detection, audit logging, and compliance monitoring. |
Security question responses (if used for password recovery or account verification) | Yes, directly from user input (if applicable) | No, we do not disclose this data unless required by law or for security investigations. |
Access tokens and API credentials (for integrations or developer accounts) | Yes, directly from registered developers | Yes, only with infrastructure services to manage token validity and access controls. |
Payment method data in combination with identifiable user credentials (if applicable) | No, we do not collect full payment details | Not applicable |
Two-factor authentication (2FA) data, such as a mobile number or email, used for OTP | Yes, from user input during security setup | Yes, to trusted SMS/email service providers to deliver authentication codes securely. |
Cookies or tokens that track session activity tied to account credentials | Yes, via web interactions | Yes, shared with cookie management and analytics tools for maintaining session continuity and improving user experience. |
Contact Us
If you have any questions or comments, contact us at:
Email Address: support@broken-links-checker.net
Ready to Find Your Broken Links?
Don’t let dead links kill your SEO. Run a quick scan — catch issues before Google does.