At I2r POWER, we are committed to protecting your privacy. We recognize the importance of protecting the confidentiality and security of the information we collect about individuals. The material below describes our policies concerning the collection, use and disclosure of personal information we receive about individuals who seek to obtain, obtain or have obtained products or services from us, and whether and when we might share information with others.
Why We Collect and How We Use Information
We collect and use information for business purposes with respect to our business relationships with you. We may use information to offer you other products or services, to enhance and improve existing products or services, or to design new ones.
How We Collect Information
We get most information directly from you. The information you provide us voluntarily when inquiring about our products or services.
How We Protect Information
Information We Collect
When you enter our website, information is gathered from your Internet browser. This information may include your Internet protocol (IP) address (which allows us to determine the identity of your Internet Service Provider), your operating system, and the type of browser software that you are using to access the website. This information allows us to upgrade the website as necessary to optimize its efficiency.
Should you voluntarily provide your personal information to us on our website, you may receive email messages from us. Each such email will include simple instructions should you decide you no longer wish to receive messages from us. Unless you elect not to receive such messages when submitting information to us on our website, you will receive these emails from us. Likewise, if at any time you request to be removed from one of our mailing lists, your email will be removed from that mailing list within ten business days. You can also always opt-out of receiving these email messages by contacting us.
We realize that foremost in the minds of privacy-conscious individuals is the security of information after its submission. All personal information collected in order to enable us to provide you with services is securely stored in databases. Additionally, access to the information stored on our databases is restricted to select employees and other authorized personnel, including those third parties necessary to perform services for us and for you. Where appropriate, we may employ firewalls, encryption technology, user authentication systems and access control mechanisms to control access to systems and data. If sensitive data is being transmitted, we will utilize security technology to ensure safe transmission. However, note that you should exercise discretion with respect to the submission of any personal or financial information. Transmitting information via the Internet is never completely secure and, thus, any information submitted may be intercepted, collected, used or disclosed by others. We will use appropriate technology to minimize that risk.
Links to Other Websites