What Personally Identifying Information Does Aftermath Collect and How Does Aftermath Use It?
In order to access certain services and portions of the websites or marketing or education programs we offer, you may be required to register by providing certain, limited, personal information regarding you and the company you represent, such as your name, your company name, your email address or billing information, or other data which can be reasonably linked to such information by Aftermath. Aftermath may use this information to contact you and others at your company to further discuss your company’s interest in Aftermath and to send information regarding Aftermath, such as newsletters, promotional materials, and information about upcoming events and training.
When you send emails or other communications to Aftermath, Aftermath may retain those communications in order to process your inquiries, respond to your requests and improve Aftermath’s products and services.
Aftermath uses collected personal information for the following general purposes: products and services, billing, identification and authentication, products and services improvement, contact, and research. If Aftermath uses your personal information in a manner different than the purposes for which it was collected as disclosed in this policy and otherwise by Aftermath to you, then Aftermath will ask for your consent prior to such use.
What Tracking Information Does Aftermath Collect and How Does Aftermath Use It?
All information that Aftermath collects may be used for improving our products and services, providing more effective customer service, performing research, and identifying ways of improving our site.
How Does Aftermath Store My Data?
Aftermath uses its own and third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run our business. The technical processing and transmission of the Service, including your content, may involve (a) transmissions over various networks, and (b) changes to conform and adapt to technical requirements of connecting networks or devices. Currently, Aftermath and its authorized third party vendors and hosting partners process data (including possibly your personal information) on servers in the United States of America. In some limited cases, personal information may be processed and stored outside the United States of America.
All customer data, including service records and cleanup documentation, is stored on a secure server within a high security firewall, with restricted access to external networks.
When Does Aftermath Disclose My Data?
Aftermath only shares information with other companies or individuals outside of Aftermath in the following limited circumstances:
Your Choices, Accessing and Updating Information
If you become a customer, you may control certain information stored by Aftermath. For example, Aftermath collects your email address. If you previously opted-in to receive marketing emails, no longer want us to contact you for marketing purposes, you can change your account settings by opting out of marketing related emails. Please remember that we will always need an email for mandatory service communications such as billing reminders, information on pending job details, and security announcements.
Because of the way Aftermath maintains certain records, after we delete your information, residual copies may take a period of time before they are deleted from Aftermath’s active servers and may remain on backup systems.
Security and Retention
Aftermath takes commercially reasonable security measures to guard your information from unauthorized access to or unauthorized alternation, disclosure or destruction. These measures include safeguards such as firewalls, encryption and secure technology. Certain areas of the Aftermath websites such as online payment may only be accessed with a user ID and password. It is your responsibility to keep your password confidential and not disclose it to any other person. You are responsible for all persons using your user ID and password. Please advise us immediately if you believe your user ID and password have been compromised.
Aftermath restricts access to your information to Aftermath employees, contractors and agents who need to know the information in order to process it on Aftermath’s behalf. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
However, neither people nor security systems are foolproof, including encryption systems. In addition, people can commit intentional crimes, make mistakes, or fail to follow policies. Therefore, while Aftermath uses commercially reasonable efforts to protect your information, Aftermath cannot guarantee its absolute security. If applicable law imposes any non-disclaimable duty to protect your information, you agree that intentional misconduct will be the standards used to measure our compliance with this duty.
Aftermath retains information for as long as required, allowed or Aftermath believes it is useful, but does not undertake retention obligations. Aftermath may dispose of information in Aftermath’s sole discretion without notice, subject to applicable law that specifically requires the handling or retention of information. You must keep your own, separate back-up records of your data.
If you have any questions regarding this policy or your rights to data protection, please contact us by email email@example.com.