What personally identifiable information is collected from you throughout the website, how it is used, and with whom it may be shared.
What options are available to you regarding the use of your information.
The security procedures which have been established to protect the misuse or unauthorized access of your information.
How you can correct any inaccuracies in the information which you provide us.
Use of Information
We are the sole owners of the information collected on this website. The only information which we collect is that which you voluntarily provide to us via email or other forms of direct contact (such as contact forms). No other party is allowed access to this information.
Your information will be used only to respond to your inquiry or reason which you contacted us. Your information will not be shared with any third parties, or anyone outside of our organization.
Control of your Personal Information
At any time, you may opt out of any future contact from us. By contacting us via any method on our website, you can do any of the following:
• See what information we have about you, if any.
• Change, correct, or update any information which we have about you.
• Have us permanently delete any information we have about you.
• Express any concerns which you may have about our use of your information.
Security / How we Protect your Information
We have taken, and continue to take, precautions to protect your personal information. Whenever you submit any sensitive information via this website, your data is protected both online and offline.
Wherever we collect sensitive information (such as details on a potential case), that information is immediately encrypted and transmitted to us in a secure way. You are able to verify this by looking for a closed lock icon at the bottom of your web browser, or looking for “https” at the beginning of the address of the web page.
While we use secure encryption to protect any sensitive data transmitted online, we also protect your information offline. Only employees who have a direct need to view your information to perform a specific task (for example, followup on an inquiry) will have access to this information. All servers / computers on which this information is stored are kept in a monitored, controlled-access environment with access control.