What personal information do we collect from the people that visit our application?
In order to gain access to our applications, you may be asked to enter user name, password, first and last name (= ‘Personal Information’).
When do we collect information?
We collect the Personal Information when your user account is established or when there is an update to the that information
How do we use your information?
We use the information we collect to gain you an access to the applications
How do we protect visitor information?
We do not use vulnerability scanning and/or scanning to PCI standards. Your personal information is contained behind secured networks and is only accessible by limited number or persons who have special access rights to the system, and are required to keep the information confidential. In addition, all the information you supply is encrypted via Secure Socket Layer (SSL) technology.
Third party disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information
Third party links
We do not include or offer third party products or services on our applications
We have not enabled Google AdSense on our applications
COPPA (Children Online Privacy Protection Act)
We do not market to children under 13.
Fair Information Practices
The Fair Information Practices Principles from the backbone or privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via a clear message in the applications within 1 business day. We also agree to the individual redress principle, which requires the individuals have a right to peruse legally enforceable rights against data collectors and processors who fail to adhere to the law. The principle requires not only that individuals have enforceable rights against data users, but also the individuals have resource to court or government agency to investigate and/or prosecute non-compliance by data processors.