Making the Security of Your Information Our Priority.
Keeping your information secure is one of our most important responsibilities. We value your trust and handle your information with care.
At Eworks, we:
Limit access to Customer Information to those associates who need to know your information to provide services to you or to maintain and service your website/project.
Maintain physical, procedural and electronic safeguards to protect our customers information.
Continually acquire new technology for the protection of your information and upgrading our systems on a regular basis.
What Information We Collect
We may collect “Non-public Personal Information” about you or your business from the following sources:
Information we receive from you on applications, other forms or visits to our web site.
Information about your transactions with our affiliates, others, or us.
“e;Non-public Personal Information”e; is information that is not available to the public and that we obtain in connection with providing a product or service to you. For example, non-public personal information includes information regarding your project, payment methods or overdue balances for services and products.
We always limit our collection of information, to that information we believe is necessary to conduct our business properly, so that we can provide you with excellent service and to offer you additional products and services that we believe will be of interest to you.
How We Use the Information We Collect
We will use the information that we collect about you only:
To provide products and services to you.
To identify any additional products or services that we feel may be of value to you.
To protect your account(s) and guard against any unauthorized access to information.
In accordance with the principles in this policy.
Disclosure of Information to Third Parties
We do not sell nonpublic information to anyone and do not disclose nonpublic information about our customers or former customers to anyone, except as required and permitted by law. In no circumstance, will we provide customer account information to third parties for marketing purposes.
If you close your account(s) or your relationship becomes inactive with us, we will continue to treat the information we have collected about you in accordance with this notice.
How We Protect the Confidentiality of Information We Collect
We Make Every Effort to Maintain and Report Accurate Information We Collect
We are committed to maintaining the accuracy of customer information. If you become aware of any inaccurate information contained in our records, you should contact us at our number listed below and we will investigate the inaccuracy and correct it as promptly as possible.
Privacy on Our Web Site
We appreciate that both customers and those just visiting our web site have special concerns about the privacy of their nonpublic information on the INTERNET. We also want you to know the steps that we have taken to provide you with the safety and security of your information when communicating with us on our web site and the INTERNET.
Maintaining the Security of Customer Information Provided Online
We are committed to assuring the security of your information exchanged through online communications is secure. We maintain electronic and procedural safeguards that comply with federal standards and establish a “secure” INTERNET session by encrypting the data you submit to us online.
Protecting Online Applications
When you apply online for services or products offered by us, your sensitive information is mostly sent to us using secure socket layer (SSL) technology. This information is only accessible to authorized representatives, as well as companies that work for us, to conduct business for us and offer you services related to your needs.
Firewalls and Activity Logs
Firewalls and activity logs are additional mechanisms that are used to protect your privacy. Firewalls analyze the source and destination addresses and the traffic type to ensure that only authorized users have access to our systems. A Network Administrator also reviews activity logs to see if anything appears out of the ordinary. We look at specific information only to investigate activities that appear suspicious and to protect our systems and your information.