We take your privacy very seriously. Read below to see what information we collect about you, how we store it, how we protect it, and what we share with third parties.
Information we collect
Our web servers record information each time you browse our website. This information includes the time and date you visited, the areas or pages you accessed, the public IP (Internet Protocol) address of the device you used to access our website, and certain information about the device, such as its browser, operating system, and whether it is a mobile or desktop device. Your IP address can also be used to determine your general location, such as which state you are located in within the United States. All websites are capable of capturing this type of information.
When you create an account, you provide us information such as your name, email address, street address, and phone number, as well as other information such as the name of your business or organization. We require some information to be provided in order for you to access certain services.
If we have a certain business relationship with you, we collect and store certain financial information, such as invoices and payment records.
If we host your website or you give us access to log in to your website, we will collect and store any login information necessary to access your website.
We do not use any third-party analytics services, such as Google Analytics, to track your browsing activity on our website. However, websites we host on behalf of a client may utilize third-party analytics or other tracking services. We may from time to time utilize our own analytics service, but the information we collect is for our own use only, and will not be shared with third-parties.
How we store your information
For the most part, your information is stored electronically within databases, log files, and electronic notebooks. Sensitive information, such as passwords and encryption certificates, is stored within password managers protected by multiple levels of security.
How we protect your information
Information we collect is adequately protected against unauthorized access:
- All communication with our website and online services is transmitted using Transport Layer Security (TLS).
- On our internal networks, we utilize Virtual Private Networks (VPN) to communicate with our servers in the cloud.
- Sensitive information in our databases is encrypted at rest, and all database backups are encrypted.
- All devices that we use utilize strong passwords and other biometric authentication (e.g., facial recognition, fingerprint scans).
- All of our portable devices utilize full disk encryption, so that in the unlikely event they are lost and stolen, their contents cannot be accessed.
What we share with third parties
We may from time to time mention the names and types of companies we work with, as well as details of certain projects we work on, with our other current or potential clients. We may provide links or screenshots of client websites as well as general information on the kind of work we perform.
We will not share any information protected by confidentiality agreements or other agreements.
We hope that's clear