The Typesafe Software utilizes Google Analytics (http://www.google.com/analytics/) to anonymously collect information regarding the usage of that software. You may opt out of the use of Google Analytics by following the directions at the Google Analytics Opt-Out Page.
Typesafe does not use your IP address or host name to identify you in any way, and does not collect any information that can uniquely identify you as an individual.
Data collected by the Typesafe Software relates purely to usage patterns of Typesafe technologies and any third-party templates, plugins or add-ons related to these technologies. This includes, but is not limited to, information on template/plug-in/add-on names, version numbers, invoked actions and commands, usage timestamps and other project statistics.
The Typesafe Software may collect and transmit geographical, locale and other information as reported by the JVM and Operating System.
USES OF THE INFORMATION
Typesafe may, at its sole discretion, make available to third parties, on a case-by case-basis, data that it collects through Google Analytics, whether in raw or aggregated form.
Geographical and locale based information is used to ascertain localization requirements for future product releases.
Typesafe may publish summary reports based on the data obtained. These reports will be made available in machine readable format that will allow individuals and organizations to undertake further analysis.
Potential uses of the summary reports may include, but are not limited to:
a. Obtaining a better understanding of how individuals are using Typesafe technologies, third party templates and plugins such that future improvements are better targeted.
b. Estimating user base size of various Typesafe technologies.
It is expected that the summary reports and raw data may be used for other purposes that have not yet been envisioned.
INTERACTIONS WITH GOOGLE ANALYTICS
With user consent, the Typesafe software transmits usage data using HTTP to Google’s Analytic web application. These transmissions may occur over unencrypted HTTP transport and are therefore susceptible to intermediate devices (such as proxy servers and network analyzers) also recording the data.