ABBYY Privacy Vocabulary

  • Cookies

    A "cookie" is a small text file. When you visit our websites, they ask your browser to put and store a cookie on your device to remember such information as your language or location to understand your preferences and customize the design of our websites for you. Cookies cannot read data from your device and cannot download information from any other cookies created by other websites. The term cookie includes similar technologies such as web beacons or web bugs (also known as an Internet tag, pixel tag or clear GIF, links web pages to web servers and their cookies) and Local Shared Objects, known as “flash cookies” (companies that advertise on our websites may use it to store your preferences or display content based on what you viewed on various websites or applications to personalize your visit. To control your use of Flash cookies, visit Adobe website at

  • Device

    A computer that you use to get our products or visit our websites. For example, it can be a desktop computer, notebook, smartphone or tablet.

  • Encryption

    We code your information so that we use a secret key to read this information. Only we know that key.

    For example, we use Hypertext Transfer Protocol Secure (HTTPS) to protect connection between your device and our server.

  • Internet Protocol (IP) address

    When you use a device online, it receives an Internet protocol address (IP). It looks like a combination of numbers ( Usually, this combination depends on you location where you use you device online. It means that IP can also be used to identify your location.

  • Non-sensitive personal data

    Information that does not result in a high risk for you. Such information includes IP address, email, telephone number, name and last name.

  • Personal data

    Any information that can identify you or we can know that information is about you.

  • Profiling

    Automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to you, for example, to analyse or predict aspects concerning your personal preferences, interests, behavior.

  • Recognition

    Our product converts scans and images into plain text that you can further edit by a word processor and use for your purposes.

  • Server logs

    When you visit our websites, our servers automatically record the page requests made when you visit our websites. Usually such logs include your web request, Internet Protocol address, type and language of your browser, time of your request and text that can identify your browser.

    Here is an example of a typical log entry where the search is for “flexicapture”, followed by a breakdown of its parts:

    05.02.2010 10:29:41

    GET /search/ searchText=flexicapture



    • "05.02.2010 10:29:41" is the date and time of the query;
    • "GET /search/ searchText=flexicapture" is the requested Path, including method and the search query;
    • "Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/65.0.323252.181 +Safari/537.36" is the browser and operating system being used;
    • "" is the URL-address of the webpage that linked to the resource being requested;
    • "1002.752.7.19434" is the Internet Protocol address assigned to the user by the user’s ISP; depending on the user’s service, a different address may be assigned to the user by their service provider each time they connect to the Internet.
  • Statistical information

    We may receive such details as how often you use our product or the amount of product you used. We use it to understand what features of our product we should improve to give you better experience and for fraud detection. We can also use statistical information for calculating your payments for our different products you used.

  • Targeted advertising

    We may partner with advertising networks, which may use information collected through a variety of data technologies to provide customization, auditing, research and reporting for us and other advertisers. Advertising networks also may use this information for determining or predicting the characteristics and preferences of their respective advertising audiences and measuring the effectiveness of their advertising in accordance with their privacy policies.

  • Unique identifiers

    A combination of characters or symbols that is written on your device by a manufacturer that can be used for identification of that device. There are many examples of such identifiers: Android_id or UDID (unique device identifier), IMEI (International Mobile Equipment Identity) for mobile phones or various identifiers of social networks or advertising companies. One device may have several unique identifiers. Unique identifiers have different lifespans. Some of them can be easily accessible for you, while others not.

    Unique identifiers can be used for various purposes – from providing a mobile version of a website if you use a mobile phone to detect fraud, provide security and show relevant advertisement on the basis of analysis of your preferences and behaviour when you visit a website from you device.

  • Widget

    A software tool that we have on our websites to let you do such things as share pages and content from our websites back to your Facebook profile with one click, so all or particular your friends can read them. It also lets you watch YouTube videos online on our websites.