I. INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, the general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and a number of clicks. Personal Information includes only your email, which you submit to us through the registration process at the Site.
Information collected via Technology
The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser.
Information you provide us by registering for an account
II. HOW WE USE AND SHARE INFORMATION
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support, and inform users about promotional offers.
III. HOW WE PROTECT INFORMATION
We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
IV. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
V. LINKS TO OTHER WEBSITES
VII. CONTACT US
To help you do your job, we <Callais.inc> may give you access to computers, computer files, an email system, and software. You should not password protect any file without authorization. To make sure that all employees follow this policy, we may monitor computer and email usage. All <Callais.inc> email is the property of <Callais.inc>.
We try hard to have a workplace that is free of harassment and sensitive to the diversity of our employees. Therefore, we do not allow employees to use computers and email in ways that are disruptive, offensive to others, or harmful to morale.
At <Callais.inc> you may not display, download, or email sexually explicit images, messages, or cartoons. You also may not use computers or email for ethnic slurs, racial comments, off-color jokes, or anything that another person might consider to be harassment or disrespectful.
If you know about any violations of this policy, notify your supervisor, the HR department or any member of management. Employees who violate this policy are subject to disciplinary action, up to and including termination of employment.
<Callais.inc> may provide you with internet access to help you do your job. Internet usage is intended for job-related activities but short, occasional personal use is allowed as long as you keep to reasonable limits.
All internet data that is written, sent, or received through our computer systems is part of official <Callais.inc> records. That means that we can be legally required to show that information to law enforcement or other parties. Therefore, you should always make sure that the business information contained in internet email messages and other transmissions are accurate, appropriate, ethical, and legal.
The equipment, services, and technology that you use to access the internet are the property of <Callais.inc>. Therefore, we reserve the right to monitor how you use the internet. We also reserve the right to find and read any data that you write, send, or receive through our online connections or that is stored in our computer systems.
You may not use the internet to write, send, read, or receive data that contains content that could be considered discriminatory, offensive, obscene, threatening, harassing, intimidating, or disruptive to any employee or another person.
Examples of unacceptable content include sexual comments or images, racial slurs, gender-specific comments, or other comments or images that could reasonably offend someone on the basis of race, age, sex, religious or political beliefs, national origin, disability, sexual orientation, or any other characteristic protected by law.
If you use the internet in a way that violates the law or <Callais.inc> policies, you will be subject to disciplinary action, up to and including termination of employment. You may also be held personally liable for violating this policy.
The following are some examples of prohibited activities that violate this internet policy:
· Sending or posting discriminatory, harassing, or threatening messages or images
· Using the organization's time and resources for personal gain
· Stealing, using, or disclosing someone else's code or password without authorization
· Copying, pirating or downloading software and electronic files without permission
· Sending or posting confidential material, trade secrets, or proprietary information outside of the organization
· Violating copyright law
· Failing to observe licensing agreements
· Engaging in unauthorized transactions that may incur a cost to the organization or initiate unwanted internet services and transmissions
· Sending or posting messages or material that could damage the organization's image or reputation
· Participating in the viewing or exchange of pornography or obscene materials
· Sending or posting messages that defame or slander other individuals
· Attempting to break into the computer system of another organization or person
· Refusing to cooperate with a security investigation
· Sending or posting chain letters, solicitations, or advertisements not related to business purposes or
· Using the internet for political causes or activities, religious activities, or any sort of gambling
· Jeopardising the security of the organization's electronic communications systems
· Passing off personal views as representing those of the organization
· Sending anonymous email messages
· Engaging in any other illegal activities