1. Information We Collect
2. Information collected via Technology
Preferred report settings within the Company application
User sessions and other session status information
The Company may use both persistent and session cookies. Persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you log off from the Services and close your browser.
3. Information Provided through Registration Process
4. How We Use And Share Information
5. Compliance with Laws and Law Enforcement
The Company cooperates with government and law enforcement officials and private parties to enforce and comply with the law. We will disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including but not limited to subpoenas), to protect the property and rights of the Company or a third party, to protect the safety of the public or any person, or to prevent or stop an activity we may consider to be, or to pose a risk of being, illegal, unethical or legally actionable.
6. Business Transfers
7. How We Protect Information
The Company is concerned with safeguarding your information. The security of your Personal Information is important to us. However, no method of transmission over the Internet, or method of electronic storage, is 100% secure. We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology (SSL). However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
We will make any legally required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored “personal data” (as defined in applicable state statutes on security breach notification) to you via email or conspicuous posting to the Website or through the Service in the most expedient time possible and without unreasonable delay, insofar as such disclosure is consistent with (i) the legitimate needs of law enforcement or (ii) any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the data system.
Identity theft and the practice currently known as “phishing” are of concern to us. Safeguarding information to help protect you from identity theft is a priority. We do not and will not, at any time, request your credit card information, your account login information, or national identification numbers in a non-secure or unsolicited e-mail or telephone communication. For more information about phishing, visit the Federal Trade Commission’s website at http://www.consumer.ftc.gov/articles/0003-phishing.
9. Your Rights Regarding the Use of Your Personal Information
10. Links to Other Websites
12. Contact Us