The following table shows the information you selected when filling out the privacy tool.
|Type of Information||What you collect||Who collects it||For what reason||Who uses it||Stored by||Shared with|
Consent is voluntary agreement with what is being done or proposed. Consent can be either express or implied. Express consent is given explicitly, either orally or in writing. Express consent is unequivocal and does not require any inference on the part of the organization seeking consent. Implied consent arises where the consent may reasonably be inferred from the action or inaction of the individual.
We indicated that our organization does not collect any sensitive or potentially sensitive information. In the future, if our organization decides to collect sensitive or potentially sensitive information you should always understand you have given express consent as a member. In other words, you consent to us collecting the information and/or disclosing the information to another organization. For example, if we collect financial information for a credit authorization, we have the customer sign an application form that states that we will disclose the information to a credit card agency and that the customer consents to this. Express consent otherwise should be used whenever possible and in all cases when the personal information is considered sensitive.
We indicated our organization does not collect any information to complete a sale or other transaction, verify a customer’s credit, place a special order for a customer, arrange for a delivery, or process a return. If in the future our organization decides to collect this information, remember that so long as the information collected is necessary to complete one of the actions listed above, we can assume the customer has consented when he or she provides us with the information. (This is called “implied consent”).
We can’t refuse to complete a transaction if the customer refuses to consent to the collection of information that isn’t necessary to complete the transaction.
If webdecide later to use this information for another purpose, we have to go back and get the customer’s consent.
We collect the following information for secondary purposes, such as marketing, administering a customer loyalty program, or customer relationship management:
In these circumstances, we have to give the user an opportunity to tell us they don’t want us to use their information for that purpose. This is called an “opt-out”.
Opt-outs have been clear, easy to understand and easy for the user to do. We have an opt-out box on all paper-based and web application form, that tells users that if they don’t want to receive promotional material in the mail, just check here. We may want to let the customer know what they’ll be missing – special deals and new product information, – we don’t minimize, hide or obscure the opt-out. And don’t make it complicated, like requiring the user to call a special phone number between certain hours. The point is to let the user decide.
EMPLOYEE ACCESS TO CUSTOMER INFORMATION
We indicate that there are no employees in our organization who see or process information unnecessarily. This is a good practice. By limiting the number of people who view or process information we reduce the risk of inappropriate use or disclosure.
STORAGE OF PERSONAL INFORMATION: PAPER FILES
We indicate our organization does not keep any information in paper files.
In the future, if we do plan to store personal information in paper files, it is extremely important to take all measure possible in order to safely store our user’s personal information. We would protect those files by moving them to:
A locked cabinet
A restricted area
An area with an alarm system
STORAGE OF PERSONAL INFORMATION: ELECTRONIC FILES
The following includes the types of information we may store in electronic files:
It is extremely important to take all measures possible in order to safely store our users’s personal information. The following methods to protect those files by using:
Encrypted data files
Encrypted personal information that is sent or received over the Internet (by email or through web forms, for eg.)
Electronic audit trails that identify who has access information
Keeping backup files in a locked cabinet
We are especially careful with laptops, USB keys and electronic wireless devices. All of these devices are password protected and have the strongest form of protection possible.
COLLECTION OF SENSITIVE INFORMATION
We indicated that our organization does not collect any information that is sensitive or potentially sensitive. In the future if our organization decides to collect sensitive or potentially sensitive information consider using more than one method to ensure that it is kept confidential.
THIRD PARTIES LIST
We share personal information with the following third party suppliers or agents:
With No Other Parties
We review the privacy practices of these firms to make sure they meet the same standards that we apply to our site. We requiremthird party to:
require the third party to protect your customer information
give you the power to audit the third party to make sure they’re complying with fair information practices
make sure the third party only uses the information for the purposes set out in the contract
require the third party to pass on to you any requests from customers to see their customer records