We understand that your privacy is important to you and all the information that you share with ITSpectrum Solutions is in safe hands at all times. Your confidential information is handled by us in a fair and responsible manner. We may collect your personal identification information from you when you visit our website and fill out an inquiry form.
This policy describes the type of information we may collect from you or that you may provide when you visit the website www.itspectrumsolutions.com (our official Website) and our practices for collecting, using, maintaining, protecting, and disclosing that information.
Please read this statement carefully to understand our policies and practices regarding your information and how we will treat it.Information we collect
We use the information we collect from Users to provide more meaningful service and to offer relevant products and services, as well as to maintain, protect and improve Users’ overall experience. When a user submits a request for support, ITSpectrum Solutions may collect the following types of information: name, telephone number, email address and other information that the User chooses to give us to respond to the support request.
When you connect with us through a social media platform, we may, depending on your privacy settings, receive some information from your social media account. When you use the Services, we use collect information about which features you’ve used, how you’ve used them and the devices you use to access the Services. It depends on the settings of a User’s computer or mobile device. ITSpectrum Solutions automatically collects: Internet Protocol (IP) address; MAC address; Device make, model and operating system version; mobile network information; internet service provider; browser type and language; country and time zone in which the Device is located; and metadata stored on the Device. This information is collected through cookies and other tracking tools. ITSpectrum Solutions may supplement the information you provide to us with information from other sources. All of this information is treated as personal information when it directly or indirectly identifies an individual User.How we use the information
We use information to operate the Services, including:
We may disclose all the aggregated information about our users without any restriction.We may disclose personal information that we collect, or you provide as described here:
We may even disclose your personal information:
Applicable law may require us and our service providers to disclose your information if: (i) reasonably necessary to comply with a legal process, such as a court order, search warrant, government investigation or other legal requirements; or (ii) necessary for the prevention or detection of crime (subject in each case to applicable law).Take your consent or your request
Certain features of our Website may use locally stored objects (or Flash cookies) to collect and store information about your preferences and navigation to, from, and on our Website. Flash cookies are not managed by the same browser settings as are used for browser cookies.Web bugs in emails
Pages of the Website/marketing emails may contain small electronic files known as web beacons/web bugs (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or and for other related website statistics (for example, recording the popularity of certain website content and verifying system and server integrity).
Web bugs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of Web users. In contrast to cookies, which are stored on a user’s computer hard drive, web beacons/web bugs are embedded invisibly on Web pages or in emails and are about the size of the period at the end of this sentence. We use the web bugs in our HTML-based emails to let us know which emails have been opened by recipients. This allows us to gauge the effectiveness of certain communications and the effectiveness of our marketing campaigns. We tie the information gathered by the web bugs in emails directly with our customers’ Personal Information.Log files
We may collect demographic information, such as your ZIP code, age, gender, preferences, interests, and favorites using log files that are not associated with your name or other personal information. There is also information about your computer hardware and software that is automatically collected by us. This information can include your IP address, browser type, domain names, internet service provider (ISP), and the files viewed on our site (e.g., HTML pages, graphics, etc.), operating system, click stream data, access times and referring website addresses.How we protect and retain information
We use physical, technical and organizational measures designed to protect your information against unauthorized access, theft and loss. We restrict access to your personal information to those employees who need to know that information to service your account or perform their job functions. We take precautions intended to help and protect information that we process as no system or electronic data transmission is completely secure. Any transmission of your personal data is at your own risk and we expect that you will use appropriate security measures to protect your personal information.
You are totally responsible for maintaining the security of your account and the information in your account. We may suspend your use of all or part of the Services without notice if we suspect or detect any breach of security. You understand and agree that we may deliver electronic notifications about breaches of security to the email address on record on your account.Links to other websites and services
In order to protect your personal data from misuse, loss and destruction, we have integrated various security parameters. We maintain security arrangements at various levels such as physical, organizational and technical security. ITSpectrum Solutions carries security measures totally based on industry standards in order to help protect against public access. Only the team members or employees with specific authorization have the right to access users’ personal information.Data Security
We have implemented different measures that are designed to secure your personal information from accidental loss and from unauthorized access, use, alteration, and disclosure. All information you provide to us is stored on our secure servers or those of our service provider behind firewalls, using SSL technology. The safety and security of your information also depend on you. Where we have given you (or where you have chosen) a password for access to certain parts of our Website, you are responsible for keeping this password confidential. We ask you not to share any personal information with anyone.