Overview and our Purpose
Lusha’s core purpose is to make online engagement safe and efficient. In today’s fast-paced and multi-layered world, one of the main challenges to online users is trust. A major risk in online interactions is the risk of encountering fraud, whether by phishing attempts or by identity theft. Widespread fraud can lead to the loss of customer trust, extra costs of time and money required to manage fraud incidents, damages to the reputation of individuals and institutions, possible legal costs and many more negative outcomes.
Lusha’s unique solution is based on a collaborative security effort, effectively utilizing information to verify online identities. The Lusha service provides its users with valuable insights and assists in authenticating the identity of individuals in the online sphere.
While our goal is to help people and companies make better and safer connections, we respect the rights of individuals to exercise control over their data. For that reason, we have created an automatic removal form which is available here. You may also request Lusha to rectify any personal data concerning you.
Business Profiles Only
We collect information concerning business profiles, including information associated with company executives, decision makers, and other employees. The information collected is similar to that which is typically included on a business card, business email signature block, or an online professional profile, including name, company name, job title, email address, phone numbers, business address, and social media links. We do not collect or provide sensitive personal information of any kind such as health information, political or religious ideology, any kind of financial information, internet search history, etc.
Lusha enables its users to receive information only regarding individuals which already voluntarily provided information about themselves over the internet. A Lusha user cannot simply enter a search query to receive information. The Lusha services are based on “adding” information to an existing social profile, which an individual has created on the internet. Lusha’s solution, therefore, applies only to those internet users who have made themselves “publicly available” by sharing information online.
The Sources of Our Data
Lusha collects information from publicly available sources and from its business partners which take part in building and improving the Lusha community, (as part of the collaborative security effort). Lusha also uses algorithms and machine learning to complete email addresses based on standard corporate email patterns. Lusha ensures that collection and processing of data are done in accordance with all applicable privacy laws, including providing individuals with greater control over their data.
We do our best to bring together contact information from a variety of public sources (such as is available on the Internet through a simple Google Search) and combine it with contact information that our users contribute.
Whenever it is possible, we are happy to provide data subjects with the exact source of the data associated with the data subject. However, in some cases, due to technical considerations, locating the data source is impossible or requires a disproportionate effort. In such cases, we will maintain the data subject’s control over his or her data by removing all the personal data found at our database associated with that data subject.
If you have any additional questions on our privacy practices, please feel free to address us at Privacy@Lusha.co. Also, please note that you have a right to lodge a complaint with the supervisory authority.