Privacy Policy of RealtyOutreach

Last Updated: Feb 14, 2025

At RealtyOutreach ("Company," "we," "our," or "us"), we value privacy as a fundamental right and take our responsibility to protect your personal data seriously. This Privacy Policy outlines our commitment to transparency, security, and compliance with global data protection laws, including the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

By using our website, services, or any affiliated digital platforms, you acknowledge and agree to the practices described in this Privacy Policy. This document explains how we collect, use, share, and safeguard your personal information. We encourage you to read it carefully.

1. Information We Collect

A. Automatically Collected Data

When you visit or interact with our website, our system and trusted third-party service providers automatically gather certain types of technical and behavioral data. This data collection is crucial for optimizing our website’s performance, ensuring compatibility with various devices, and protecting against fraudulent activities. Here’s a breakdown of the information we collect automatically:

  1. IP Address: Your IP address is recorded to help with security monitoring, fraud detection, and estimating your general geographical location. While we do not track precise real-time locations, IP addresses allow us to customize content and ensure compliance with regional regulations.
  2. Browser Type and Version: To provide a seamless browsing experience, we collect details about your browser type and version. This helps us ensure that our website is fully compatible with different browsers, allowing users to access all features without technical difficulties.
  3. Internet Service Provider (ISP): Information about your ISP helps us diagnose connectivity issues and detect security threats, such as bot attacks or unusual traffic patterns.
  4. Referral and Exit Pages: Our system tracks how visitors arrive at and leave our website. Whether you clicked on an ad, searched for our site, or followed a referral link, this data helps us measure the effectiveness of marketing campaigns. Likewise, tracking exit pages allows us to understand where users tend to leave, helping us improve engagement and user retention.
  5. Timestamps of Website Interactions: We log detailed timestamps of user interactions, including page views, downloads, and form submissions. This information helps us analyze site performance, detect peak usage times, and troubleshoot potential issues.
  6. Cookies and Tracking Identifiers: Cookies and tracking technologies allow us to recognize returning users, store preferences, and personalize the browsing experience. These technologies enable functions like remembering login details, maintaining shopping cart data, and tailoring content based on past interactions.

These data collection methods are standard practices across online platforms and are primarily used to enhance user experience, ensure security, and refine website performance.

B. Data from Third-Party Sources

In addition to collecting data directly from users, we may receive supplementary data from third-party sources. This data acquisition helps us maintain accurate records, improve services, and offer relevant products. Below are the primary third-party sources from which we gather information:

  1. Publicly Available Sources: We may obtain professional details from publicly accessible business directories, industry-specific platforms, or professional networking sites. These sources typically include business contact information that is publicly listed.
  2. Strategic Data Partnerships: Our partnerships with industry databases and data vendors allow us to enhance our existing records and refine our marketing efforts. These collaborations ensure that our data remains current and relevant.
  3. Marketing & Analytics Services: We integrate tools such as Google Analytics, customer relationship management (CRM) platforms, and other marketing services to gain insights into user behavior. These services help us analyze website traffic, engagement trends, and campaign effectiveness.

C. Geolocation Data

While we do not actively track users' precise locations, we may estimate general locations based on network data. This enables us to offer localized content and improve user experience. The following methods are used to estimate general geolocation data:

  1. IP Address-Based Geolocation: By analyzing IP addresses, we can determine approximate locations such as country, state, or city. This helps us customize content and provide users with relevant regional information.
  2. ISP and Network Data: We may use ISP details and network data to infer broad location information. This allows us to tailor content and services without violating user privacy.

ISP and Network Data:

D. Anonymized Data for Insights and Research

To maintain a balance between data-driven insights and user privacy, we employ strict anonymization techniques before sharing or analyzing data. The methods used include:

  1. Aggregation: We combine multiple data points from different users to generate general trends rather than analyzing individual user behavior. This approach ensures that insights are drawn from a broad dataset without compromising privacy.
  2. De-identification: Before storing or sharing data, we remove personal identifiers such as names, email addresses, and contact details. This process ensures that data cannot be traced back to any individual user.

Anonymized data may be shared with trusted partners, research organizations, or marketing agencies to improve services, conduct market analysis, and enhance data-driven decision-making. These data-sharing practices are conducted in compliance with applicable privacy laws and industry regulations.

2. Personal Information We Collect & How We Use It

At RealtyOutreach.com, we are committed to transparency in how we collect, process, and use personal information. Our data collection practices focus on helping businesses connect with professionals while ensuring compliance with privacy regulations. Below, we outline the types of personal information we collect, the sources we use, and the ways in which this data is utilized.

A. Personal Information We Collect

We primarily collect business-related personal information from real estate professionals, including:

  • Full Name – The name of the professional associated with a real estate business.
  • Company Email Address – A professional email address used for business-related communication.
  • Job Title – The individual’s role within their company, helping categorize and refine our database.
  • Business Phone Number – A professional phone number used for outreach and networking.
  • Company Mailing Address – The physical address of the professional’s business location.

This data allows businesses to connect with real estate professionals in a meaningful and efficient manner.

B. How We Collect Personal Information

We collect business-related contact data through two primary methods:

1. Publicly Available Sources

We source business information from publicly accessible platforms, including:

  • Business directories
  • Professional listings
  • Real estate association databases
  • Regulatory filings that contain publicly disclosed business contact details

These sources help us compile accurate and relevant contact information for real estate professionals.

2. User Submissions

In addition to publicly available data, we collect personal information directly from users who engage with our website and services. These methods include:

  • nquiry Forms – Users voluntarily submit their details when requesting information or subscribing to services.
  • Live Chat Interactions – Customer support chats may require users to share professional contact information.
  • Email and Phone Correspondence – Business professionals who contact us directly may provide their details for follow-ups.

By combining publicly sourced data with user-provided information, we ensure the accuracy and reliability of our database.

C. How We Use Personal Information

We process collected data strictly for professional and business-related purposes. Below are the key ways in which we utilize this information:

1. Providing Business Data for Marketing and Outreach

One of our primary uses of personal information is to enable marketing and outreach efforts. Businesses looking to connect with real estate professionals can leverage our data to:

  • Generate targeted marketing campaigns
  • Develop industry connections
  • Facilitate professional networking opportunities

2. Enhancing the Visibility of Businesses in Online Searches

By maintaining an extensive and structured database of real estate professionals, we help businesses and service providers find relevant industry contacts more efficiently.

3. Improving User Experience and Website Functionality

Analyzing user interactions with our website helps us improve website performance and provide a more seamless browsing experience. This includes:

  • Tailoring content to specific industry professionals
  • Ensuring ease of access to relevant business data
  • Enhancing website navigation and functionality

4. Developing and Refining Our Services

We continuously refine our database and platform to maintain the most up-to-date business contact information. Insights gained from user engagement allow us to

  • Enhance the quality of our data
  • Improve search and filtering functionalities
  • Ensure businesses have access to accurate, real-time information

5. Compliance with Legal and Ethical Standards

We adhere to strict privacy regulations and do not use personal data for unrelated purposes unless:

  • We have legal authorization to do so.
  • Users provide explicit consent for additional use.

We are fully compliant with data privacy laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

D. IP Address Anonymization

To protect the privacy of website visitors, we implement IP address anonymization. While we collect general IP addresses to monitor website traffic and prevent fraudulent activities, we do not process or store them in a way that allows personal identification. Key points regarding IP address handling:

  • Anonymization: We mask portions of IP addresses to prevent tracking of individual users.
  • Security & Fraud Prevention: IP addresses are analyzed in an aggregate format to detect suspicious activity without linking to identifiable individuals.
  • Regional Customization: We may use general location data (such as city or country) to tailor content, but we do not track real-time locations.

These measures ensure that visitor privacy remains protected while maintaining essential website functionalities.

E. Our Commitment to Data Privacy

At RealtyOutreach.com, we uphold the highest standards of data privacy and security. Our approach to data collection ensures:

  • At RealtyOutreach.com, we uphold the highest standards of data privacy and security. Our approach to data collection ensures:
  • Collected information remains accurate and relevant.
  • User privacy is safeguarded through anonymization and secure processing methods.

We welcome any inquiries regarding our data collection and usage practices. If you have questions or requests concerning your personal information, please reach out to our support team.

3. Data Retention & User Rights

A. Rights Under GDPR (For EEA Users)

Users located in the European Economic Area (EEA) have specific rights under the General Data Protection Regulation (GDPR) regarding their personal data. If you are an EEA user, you can withdraw consent for data processing at any time. Upon receiving a valid request, we will:

  • Stop Processing Personal Data – We will immediately halt any further processing of the affected data.
  • Delete or Anonymize Personal Data – Unless we are legally required to retain it, we will permanently remove or anonymize the requested data.
  • Confirm Deletion Within 30 Days – We strive to process deletion requests within 30 days. However, if the request is complex or requires additional verification, an extension may be applied.

These rights allow EEA users to have full control over their personal data and ensure compliance with GDPR regulations.

B. Rights Under CCPA (For California Residents)

California residents are protected under the California Consumer Privacy Act (CCPA), which grants them specific rights regarding their personal information. If you are a California resident, you have the right to request data deletion through the following methods:

  1. Emailing Our Support Team – Users can submit deletion requests by reaching out to our designated privacy support email.
  2. Clicking the "Do Not Sell My Personal Information" Link – We provide an accessible link on our website for users who wish to opt out of data collection and request removal of their personal information.

Processing Timeline for Deletion Requests

  • Deletion requests are typically processed within 45 days of submission.
  • In cases requiring additional time, a 90-day extension may apply, but users will be informed if an extension is necessary.

These rights ensure that California residents have control over their personal data and can choose how their information is handled.

C. Exceptions to Data Deletion Requests

While we respect users’ rights to request data deletion, certain types of data may need to be retained under specific legal and operational circumstances. In such cases, deletion requests may be denied or delayed based on the following conditions:

1. Legal Compliance

We may be required to retain certain personal data to meet legal and regulatory obligations, including:

  • Tax compliance – Records required by tax authorities.
  • Audit requirements – Data needed for financial reporting and audits.
  • Law enforcement requests – Data requested by authorities for investigative purposes.

2. Security & Fraud Prevention

To maintain security and prevent fraudulent activity, we may temporarily retain certain data, including:

  • Information linked to fraud detection and prevention.
  • Data related to unauthorized access attempts or security breaches.

3. Active Transactions or Subscriptions

If a user has an ongoing transaction or an active subscription, data retention may be necessary for:

  • Order fulfillment – Ensuring service continuity until the transaction is completed.
  • Customer support – Addressing inquiries related to active purchases or services.

Once these obligations no longer apply, personal data will be deleted or anonymized in accordance with our retention policies.

D. Our Commitment to Data Privacy

At RealtyOutreach.com, we take data privacy seriously and strive to balance user rights with compliance requirements. We provide clear and accessible channels for data requests, ensuring that:

  • Users retain control over their personal information.
  • Requests for data deletion and anonymization are handled efficiently.
  • Legal and security obligations are met while respecting user privacy.

For inquiries about data retention, deletion requests, or privacy concerns, we encourage users to contact our support team for further assistance.

4. Sharing & Disclosure of Personal Information

We only share personal data when necessary and in compliance with privacy laws.

A. Legal & Regulatory Compliance

In certain situations, we may be legally required to disclose personal data to comply with government requests, legal obligations, or regulatory requirements. This includes instances where:

  • Law Enforcement Agencies – If we receive a subpoena, court order, or legal request from law enforcement authorities, we may be obligated to provide relevant personal data.
  • Regulatory Authorities – We may disclose information to government regulators or industry bodies when necessary to comply with applicable laws and regulations.

We only share the minimum amount of data required to fulfill these legal obligations, and whenever permitted, we will notify users before such disclosures occur.

B. Trusted Service Providers

We collaborate with third-party service providers who help us maintain the functionality, security, and performance of our platform. These trusted partners assist with:

1. Cloud Hosting Services

  • Our platform relies on secure cloud infrastructure to store and manage data efficiently.
  • These hosting providers ensure data integrity, uptime, and security while maintaining industry-standard encryption for stored information.

2. Cybersecurity & Fraud Prevention

  • We work with specialized cybersecurity firms to detect, prevent, and respond to fraud, unauthorized access, and security threats
  • These providers monitor suspicious activity and protect user data from breaches and cyberattacks.

3. Analytics & Advertising Services

  • Third-party analytics providers help us measure website performance, user engagement, and visitor behavior.
  • These insights allow us to enhance user experience, improve services, and optimize marketing efforts.

Our agreements with service providers include strict data protection clauses to ensure user data is handled securely and lawfully.

C. Marketing & Advertising Partners

We may collaborate with third-party advertising platforms to deliver relevant marketing content and promotions. This includes:

1. Ad Performance Tracking

  • We use tracking technologies (such as cookies and pixels) to measure the effectiveness of ads and user engagement.

2. Targeted Promotions

  • Personalized promotions may be delivered based on user interactions, preferences, or browsing history.
  • These ads are designed to improve the relevance of marketing content shown to users.

3. Engagement Metrics

  • Ad performance and user responses are analyzed to enhance marketing strategies and user experience.
Opt-Out Options for Users

Users who prefer not to receive targeted advertising can:

  • Adjust browser settings to block cookies and tracking technologies.
  • Use ad preference tools (such as Google Ad Settings) to manage or opt out of interest-based advertising.

We respect user choices and ensure transparency regarding how advertising data is used.

D. Business Transfers

In the event of a merger, acquisition, or company restructuring, user data may be transferred to a new entity.

  • If RealtyOutreach.com is acquired or merged with another company, personal data may become part of the transferred assets.
  • Users will be notified in advance if such a transfer occurs, ensuring transparency and allowing them to make informed decisions.
  • If changes in ownership result in new privacy policies, users will have the opportunity to review and update their preferences.

We remain committed to maintaining data privacy and security regardless of business ownership changes.

E. Commitment to Data Protection

At RealtyOutreach.com, we ensure that any sharing or disclosure of personal data is:

  • Limited to necessary purposes (e.g., legal compliance, service maintenance, marketing optimization).
  • Conducted with secure, trusted partners who adhere to data protection standards.
  • Aligned with user rights, offering control over advertising preferences and data usage.

5. Data Security

We implement strong security measures, including:

A. SSL Encryption for Secure Data Transmission

We utilize Secure Socket Layer (SSL) encryption across our platform to ensure that all data transmissions between users and our website remain protected.

  • How SSL Works: SSL encryption secures data in transit by encoding information before it is sent over the internet. This prevents hackers from intercepting sensitive details such as login credentials, payment information, and contact data.
  • Why It Matters: SSL encryption helps protect users from data breaches, phishing attacks, and unauthorized data access while ensuring secure browsing and transactions.

Users can verify our SSL implementation by looking for the padlock icon in the browser address bar, indicating that their connection is encrypted and secure.

B. Access Controls & Role-Based Permissions

To maintain strict data security, we enforce access controls that limit the ability to view or modify sensitive information based on user roles.

  • Restricted Access: Only authorized personnel, such as administrators or security specialists, have access to critical databases and infrastructure.
  • Role-Based Permissions: Employees and service providers can only access specific data necessary for their job functions.
  • Multi-Layered Authentication: Administrative access requires additional authentication measures to prevent unauthorized changes.

By implementing these controls, we reduce the risk of internal security breaches and unauthorized data modifications.

C. Security Audits & Penetration Testing

To identify and mitigate potential threats, we conduct regular security audits and penetration testing across our systems.

  • Security Audits: Our IT security team evaluates system vulnerabilities, security settings, and data protection protocols to identify any weaknesses.
  • Penetration Testing: We simulate cyberattacks using ethical hacking techniques to detect exploitable weaknesses before malicious actors can take advantage.
  • Compliance Reviews: Our security team ensures that our practices align with industry regulations and data protection laws.

Regular security evaluations help us maintain a proactive approach to cybersecurity, minimizing risks before they become serious threats.

D. AI-Driven Threat Monitoring & Real-Time Detection

We utilize artificial intelligence (AI) and machine learning technologies to detect and respond to security threats in real time.

  • Automated Threat Detection: Our AI-driven monitoring systems analyze user behavior, detect unusual activity, and flag suspicious transactions.
  • Real-Time Alerts: If unauthorized access attempts or potential breaches occur, automated alerts are triggered for immediate action.
  • Fraud Prevention: AI-powered fraud detection mechanisms help identify and block malicious login attempts, phishing attacks, and fraudulent transactions.

These real-time security measures strengthen our ability to respond quickly to emerging cybersecurity threats.

E. User Best Practices for Enhanced Security

While we implement advanced security measures, users also play a crucial role in protecting their accounts and data. We recommend the following security best practices:

  1. 1. Use Strong & Unique Passwords

    • Create passwords that are at least 12 characters long, combining letters, numbers, and symbols.
    • Avoid using the same password across multiple accounts.
  2. 2. Enable Two-Factor Authentication (2FA)

    • Activate two-factor authentication (2FA) for an added layer of security.
    • 2FA requires a second verification step (e.g., a one-time code sent to a mobile device) when logging in.
  3. 3. Report Suspicious Activity Immediately

    • If you notice unauthorized login attempts, suspicious emails, or unexpected changes to your account, report them to our support team immediately.
    • Avoid clicking on unknown links or downloading attachments from unverified sources.
    • By following these best practices, users can enhance their own security and further protect their accounts from unauthorized access.

F. Our Commitment to Data Security

At RealtyOutreach.com, we are dedicated to staying ahead of cybersecurity threats and continuously improving our security measures. Our approach includes:

  • Regular updates to security protocols to address new threats.
  • Investing in advanced cybersecurity technologies to protect user data.
  • Providing users with security awareness resources to help them stay protected online.

6. Cookies & Tracking Technologies

A. Types of Cookies Used

Cookies are small text files stored on a user’s device that help websites recognize returning visitors, store preferences, and analyze site interactions. We categorize our cookies into the following types:

1. Essential Cookies

  • These cookies are required for the website to function properly.
  • They enable core features such as secure logins, form submissions, and page navigation.
  • Without these cookies, certain parts of the website may not work as intended.

2. Analytical Cookies

  • These cookies help us measure website performance, track visitor behavior, and improve user experience.
  • We use analytics tools (e.g., Google Analytics) to collect anonymous insights into how users interact with our website.
  • Examples include tracking page views, time spent on the site, and navigation patterns.

3. Marketing Cookies

  • These cookies support targeted advertising and remarketing campaigns.
  • They allow us to display personalized ads based on user interests and previous interactions.
  • We may work with third-party advertising partners to measure ad performance and optimize marketing efforts.

Each type of cookie plays a role in improving our website’s functionality and helping users receive relevant content.

B. Managing Cookie Preferences

Users have full control over how cookies are stored and used on their devices. We provide the following options for managing cookie preferences:

1. Adjusting Browser Settings

Most web browsers allow users to:

  • Block or restrict cookies from specific websites.
  • Delete stored cookies to remove existing tracking data.
  • Enable "Do Not Track" settings to limit tracking technologies.

Users can modify cookie settings through their browser’s privacy settings, typically found under:

  • Google Chrome: Settings → Privacy and Security → Cookies and Other Site Data
  • Mozilla Firefox: Preferences → Privacy & Security → Cookies and Site Data
  • Microsoft Edge: Settings → Privacy, Search, and Services → Cookies and Site Permissions
  • Apple Safari: Preferences → Privacy → Manage Website Data

2. Website Consent Banners

  • Upon visiting our website, users are presented with a cookie consent banner that provides the option to:
    • Accept all cookies for a fully optimized experience.
    • Customize cookie preferences to enable or disable specific types of cookies.
    • Opt out of tracking cookies used for analytics and marketing.

Users who wish to change their preferences later can revisit the cookie settings through our website’s privacy control section.

7. Children's Privacy

Our services are intended for users 18 years or older.

A. Intended Audience: 18 Years or Older

  • Our website and services are designed for business professionals, including real estate agents, brokers, and industry stakeholders.
  • We do not target or market our services to individuals under the age of 18.
  • Users must be at least 18 years old to engage with our platform, make purchases, or provide personal information.

If we discover that a minor has interacted with our services, we take immediate steps to address the issue.

B. No Intentional Data Collection from Minors

  • We do not knowingly collect, store, or process any data from individuals under 18 years of age
  • Our registration processes and data collection forms are intended for adults and do not request or encourage minors to provide personal information.

If a minor unintentionally provides personal data on our platform, we have protocols in place to remediate the situation as quickly as possible.

C. Immediate Data Deletion Upon Request

If it is brought to our attention that a minor’s data has been mistakenly collected, we will:

  • Promptly remove the information from our systems.
  • Ensure that the data is not shared, processed, or retained in any form.
  • Take preventive measures to avoid similar occurrences in the future.

Parents or legal guardians who suspect that their child’s information has been collected are encouraged to reach out to us immediately.

D. How to Report a Child’s Data Collection

If you believe that a minor’s personal information has been mistakenly collected by RealtyOutreach.com, please contact our support team using the following methods:

  • Email Support: Reach out to our privacy team via email.
  • Contact Form: Use our website’s privacy inquiry form to report the issue.

We will take immediate action to investigate and delete the data in compliance with applicable privacy laws, such as:

  • Children’s Online Privacy Protection Act (COPPA) – Protecting children’s data in the U.S.
  • General Data Protection Regulation (GDPR – Article 8) – Regulating data collection from minors in the EEA.

E. Our Commitment to Children’s Privacy

At RealtyOutreach.com, we take children’s privacy seriously and uphold strict policies to prevent minors from using our services. Our commitments include:

  • Ensuring that our platform is restricted to users aged 18 and above.
  • Implementing safeguards to prevent accidental data collection from minors.
  • Responding promptly to any reports of a child’s data being collected.

If you believe a minor’s data has been collected, please contact us.

8. Contacting RealtyOutreach

For inquiries or privacy-related requests, reach out to us:

  • 📧 Email: Contact Us
  • 🏢 Address: 307 West 38th St, 27th Floor, New York, NY 10018