Jan 11, 2023
- organizing it into the sections listed in the Table of Contents below,
- providing a series of examples that help illustrate how the policies may be implemented by Are You Safe? and
- defining and capitalizing a few terms that are used more than once for simplicity and brevity.
Table of Contents:
- What information we collect about you
- How we store and secure information we collect
- Other important privacy information
This policy also explains your choices about how we use information about you. Your choices include how you can object to certain uses of information about you and how you can access and update certain information about you. If you do not agree with this policy, do not access or use our Services or interact with any other aspect of our business.
Where we provide the Services under contract with an organization (for example your employer) that organization controls the information processed by the Services. For more information, please see Notice to End Users below.
What information we collect about you
We collect information about you when you provide it to us, when you use our Services, and when other sources provide it to us, as further described below.
Information you provide to us
We collect information about you when you input it into the Services or otherwise provide it directly to us.
Information you provide through our support channels: The Services also include our customer support, where you may choose to submit information regarding a problem you are experiencing with a Service. Whether you designate yourself as a technical contact, open a support ticket, speak to one of our representatives directly or otherwise engage with our support team, you will be asked to provide contact information, a summary of the problem you are experiencing, and any other documentation, screenshots or information that would be helpful in resolving the issue.
How we store and secure information we collect
Information storage and security
We use data hosting service providers in the United States to host the information we collect, and we use technical measures to secure your data.
While we implement safeguards designed to protect your information, no security system is impenetrable and due to the inherent nature of the Internet, we cannot guarantee that data, during transmission through the Internet or while stored on our systems or otherwise in our care, is absolutely safe from intrusion by others.
How to access and control your information?
You have certain choices available to you when it comes to your information. You have the right to request a copy of your information, to request the deletion or restriction of your information, or to request your information in a structured, electronic format. Please email us at email@example.com with your requests for data deletion.
Data purge request
To request a complete data purge, you can email us at firstname.lastname@example.org and we will delete all your data within a week
Account information: We retain your account information for as long as your account is active and a reasonable period thereafter in case you decide to re-activate the Services. We also retain some of your information as necessary to comply with our legal obligations, to resolve disputes, to enforce our agreements, to support business operations, and to continue to develop and improve our Services. Where we retain information for Service improvement and development, we take steps to eliminate information that directly identifies you, and we only use the information to uncover collective insights about the use of our Services, not to specifically analyze personal characteristics about you.
Other important privacy information
Your information is controlled by Avista Technology Solutions (referred to as "Are You Safe?"). If you have questions or concerns, please direct your inquiry to email@example.com