- Information We Collect
We collect various types of personal information, including:
a. Personal identification information: Name, phone number, email address, and mailing address. b. Account and authentication data: Username, password, security questions, and answers. c. Financial information: Credit card details, bank account details, billing address, and transaction history. d. Employment and education information: Employer and job title. e. Technical information: IP address, device information, browser type and version, cookies, log files, location data (GPS, Wi-Fi, IP-based). f. Usage data: Search queries, pages viewed, time spent on pages, and referral URLs. g. Communication data: Email correspondence, chat logs, customer support inquiries, survey responses, reviews, and testimonials. h. Social media data: Social media profile information.
- How We Collect Information
We collect information through various methods:
a. Directly from the user: Account registration, contact forms, surveys, customer support inquiries, email correspondence, phone calls, and in-person interactions. b. Automatically through technology: Cookies, log files, and analytics tools (e.g., Google Analytics). c. From third-party sources: Social media platforms, data brokers, publicly available sources, partners, and affiliates. d. User-generated content: Reviews, testimonials, forum posts, blog comments, and social media interactions. e. In-store or offline data collection: On-site check-in for building access.
- How We Use Your Information
We use your personal information for the following primary purposes:
- User Control Over Personal Information
Users can access, modify, or delete their personal information by emailing email@example.com
. However, we do not currently offer options for users to opt-out of certain data collection and sharing practices or provide additional privacy controls.
- Third-party Sharing
We do not share users’ personal information with any third parties.
- Security Measures
We have implemented various security measures to protect your personal information, including:
a. Encrypting data during transmission (SSL, TLS) and at rest (file level, database level). b. Using strong, unique passwords for all accounts and implementing multi-factor authentication. c. Limiting access to personal data on a need-to-know basis and regularly reviewing and updating access permissions. d. Using firewalls, regularly updating and patching network devices and software, and monitoring network traffic for suspicious activity. e. Employing virtual private networks (VPNs) for remote access and regularly updating and patching software applications. f. Performing vulnerability assessments and penetration testing, and following secure disposal procedures for physical media. g. Regularly training employees on privacy and security best practices, updating training to address emerging threats, and developing a comprehensive incident response plan. h. Reviewing and auditing vendor security practices, implementing intrusion detection and prevention systems, minimizing the collection and retention of personal data, and implementing privacy-enhancing technologies.
- Data Retention and Disposal
We retain users’ personal information for as long as necessary or until requested for deletion. Upon request, we securely dispose of personal information using disk duplication techniques.