privacypolicy

ITS Privacy Policy


We understand that your privacy is important to you, and all the information you share with ITSpectrum Solutions is always in safe hands. Your confidential information is handled fairly and responsibly by us.
We may collect your personal identification information from you when you visit our website and fill out
an inquiry form.

ITSpectrum Solutions has adopted this Privacy Policy to reflect its commitment to protecting your privacy. We take the collection of personal information from our users seriously and are committed to
protecting each User’s privacy following this Privacy Policy. In this Privacy Policy, we use the term
“User” to include any individual who accesses and uses any of our Services. Please read our privacy
policy carefully to understand our policies and practices regarding your information and how we will
treat it.

Information we collect

We use the information we collect from Users to provide more meaningful service and to offer relevant products and services, as well as to maintain, protect and improve Users’ overall experience. When a user
submits a support request, ITSpectrum Solutions may collect the following types of information: name,
telephone number, email address and other information that the User chooses to give us to respond to the
support request.

Personal Data Collection
  • collection of Personal Data shall be resorted to only to the extent that it may be necessary for the technical and commercial operation of its activities;
  • Users shall be informed of any such collection and shall also be informed of the specific purpose for which it is being collected, not later than the moment of collection;
  • The Personal Data collected shall be used fairly and lawfully for the specified purposes and only for these purposes;
  • Users shall be given access to their Data;
  • ITSpectrum Solutions shall ensure that Users’ Personal Data is kept secure using both technical and organizational measures;
  • ITSpectrum Solutions shall not pass on Users’ Data to anybody unless a User specifically consents that it can communicate his or her information; and
  • ITSpectrum Solutions shall only store Users’ Personal Data for the length of time required for the purpose for which it is collected.
How do we share information?

We use third-party operational providers to help us operate and improve our services. These third parties assist us with data hosting and maintenance, analytics, customer care, marketing, payment processing, and
security operations. All of our service providers must adhere to confidentiality obligations that are
consistent with this privacy policy. We share your information with our affiliates to help us with
technical processing operations, such as data hosting and maintenance, customer care, marketing, and
targeted advertising, a better understanding of how the services are used and users’ behavior to improve
the services, securing our data and systems, and fighting against spam, abuse, fraud, and intellectual
property infringement.

Disclosure of your information

We may disclose all the aggregated information about our users without any restriction. We may disclose personal information that we collect or that you provide, as described here:

Subsidiaries and affiliates.

To contractors, service providers, and other third parties we use to support our business and who ar bound by contractual obligations to keep personal information confidential and use it only for the
purposes for which we disclose it to them.

To a buyer or other successor in the event of a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of Company or Company’s assets, whether as a going
concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held
by Company about our Website users is among the assets transferred.

Applicable law

Applicable law may require us and our service providers to disclose your information if:

  • reasonably necessary to comply with a legal process, such as a court order, search warrant government investigation, or other legal requirements; or
  • necessary for the prevention or detection of crime (subject in each case to applicable law).
Take your consent or your request

We may ask for your consent to share your information with third parties. When we do, we will make it clear why we want to share the information. We may collect and provide aggregate information about our
Users (such as how many persons visited a particular page or activity or the likes and dislikes of our
Users) to our advertisers, sponsors, promotional partners, and affiliates, but this aggregated
information does not include personal information about any individual user.

Use of cookies and tracking tools

Our website may use cookies and other tracking tools. The cookie stores information about your computer, the type of browser you use, and how many times your computer visits a certain site. Cookies enable us to
track how often users are visiting our website, the specific pages visited, the number of entries in
specific events, the estimated audience size for sponsors and advertisers, and other user preferences.

Local shared objects and flash Cookies

Certain features of our website may use locally stored objects (or Flash cookies) to collect and store information about your preferences and navigation to, from, and on our website. Flash cookies are not
managed by the same browser settings as are used for browser cookies.

Web bugs in emails

Pages of the website /marketing emails may contain small electronic files known as web beacons/web bugs (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the company, for example,
to count users who have visited those pages or for other related website statistics (for example,
recording the popularity of certain website content and verifying system and server integrity).

Web bugs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of Web users. In contrast to cookies, which are stored on a user’s computer’s
hard drive, web beacons/web bugs are embedded invisibly on Web pages or in emails and are about the size
of the period at the end of this sentence. We use the web bugs in our HTML-based emails to let us know
which emails have been opened by recipients. This allows us to gauge the effectiveness of certain
communications and the effectiveness of our marketing campaigns. We tie the information gathered by the
web bugs in emails directly to our customers’ personal information.

Log files

We may collect demographic information, such as your ZIP code, age, gender, preferences, interests, and favorites, using log files not associated with your name or other personal information. There is also
information about your computer hardware and software that we automatically collect. This information can
include your IP address, browser type, domain names, internet service provider (ISP), the files viewed on
our site (e.g., HTML pages, graphics, etc.), operating system, click stream data, access times, and
referring website addresses.

How do we protect and retain information?

We use physical, technical, and organizational measures designed to protect your information against unauthorized access, theft, and loss. We restrict access to your personal information to those employees
who need to know that information to service your account or perform their job functions. We take
precautions intended to help and protect the information that we process, as no system or electronic data
transmission is completely secure. Any transmission of your data is at your own risk, and we expect that
you will use appropriate security measures to protect your personal information.

Links to other websites and services

The services may include links to third-party websites and services that are not operated by us. When you click these links, you will be directed away from the services. A link to a third-party website or
service does not mean that we endorse it or the quality or accuracy of the information presented on it.
If you decide to visit a third-party website or service, you are subject to its privacy practices and
policies, not ours. This Privacy Policy does not apply to any personal information that you provide to
these other websites and services.

Security

To protect your data from misuse, loss, and destruction, we have integrated various security parameters. We maintain security arrangements at various levels, such as physical, organizational, and technical
security. ITSpectrum Solutions carries security measures based on industry standards to help protect
against public access. Only team members or employees with specific authorization have the right to
access users’ personal information.

Data Security

We have implemented different measures that are designed to secure your personal information from accidental loss and unauthorized access, use, alteration, and disclosure. All information you provide to
us is stored on our secure servers or those of our service provider behind firewalls using SSL
technology. The safety and security of your information also depend on you. Where we have given you (or
where you have chosen) a password for access to certain parts of our website, you are responsible for
keeping this password confidential. We ask you not to share any personal information with anyone.

Unfortunately, the transmission of information via the Internet is not completely secure. Although we do our best to protect your personal information, we cannot guarantee the security of your personal
information transmitted to our website. Any transmission of personal information is at your own risk. We
are not responsible for circumvention of any privacy settings or security measures contained on the
website.

Changes in the privacy policy

The effective date of privacy change indicates when this Privacy Policy was last revised. Unless applicable law prevents or a change is needed to protect the privacy or security of our uses, we will
notify you before any material change takes effect so that you have time to review the changes before
they are effective. You are responsible for ensuring we have an up-to-date active, and deliverable email
address for you and for periodically visiting our website and this privacy policy to check for any
changes.