ECO JEMSS is committed to your privacy and all correspondence between our company to our clients remains confidential
Information Collection And Use
While using our Site, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited to your name, address, email, phone number, and location of work (“Personal Information”).
Like many site operators, we collect information that your browser sends whenever you visit our Site (“Log Data”). This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser type, browser version, the pages of our Site that you visit, the time and date of your visit, the time spent on those pages and other statistics. In addition, we may use third party services such as Google Analytics that collect, monitor and analyze this data to improve our services.
We may use your Personal Information to contact you with newsletters, marketing or promotional materials and other information, however each email will provide you with the ability to unsubscribe. Alternatively you may contact us to be removed from the mailing list.
Cookies are files with small amount of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive. Like many sites, we use “cookies” to collect information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Site.
The security of your Personal Information is important to us, but however you acknowledge that no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information including encryption, we cannot guarantee its absolute security.
In the event of a data breach, ECO JEMSS will notify all affected parties with seven (7) days of a breach being discovered.