Name/Title: THE SPACEADS
Email: [email protected]
INFORMATION OUR ORGANIZATION COLLECTS:
The following table shows the information we selected when filling out the privacy tool.
|Type of Information||What we collect||Who collects it||For what reason||Who uses it||Stored by||Shared with|
Consent is voluntary agreement with what is being done or proposed. Consent can be either express or implied. Express consent is given explicitly, either orally or in writing. Express consent is unequivocal and does not require any inference on the part of the organization seeking consent. Implied consent arises where the consent may reasonably be inferred from the action or inaction of the individual.
We indicate that our organization does not collect any sensitive or potentially sensitive information. In the future, if our organization decides to collect sensitive or potentially sensitive information we should always make sure we get express consent from our customer. In other words, we must ask the customer directly if they consent to us collecting the information and/or disclosing the information to another organization. For example, if we collect financial information for a credit check, have the customer sign an application form that states that we will disclose the information to a credit reporting agency and that the customer consents to this. Express consent should be used whenever possible and in all cases when the personal information is considered sensitive.
We indicate our organization does not collect any information to complete a sale or other transaction, verify a customer’s credit, place a special order for a customer, arrange for a delivery, or process a return. If in the future our organization decides to collect this information, remember that so long as the information collected is necessary to complete one of the actions listed above, we can assume the customer has consented when he or she provides us with the information. (This is called “implied consent”).
We can’t refuse to complete a transaction if the customer refuses to consent to the collection of information that isn’t necessary to complete the transaction. If we decide later to use this information for another purpose, we have to go back and get the customer’s consent.
We collect the following information for secondary purposes, such as marketing, administering a customer loyalty program, or customer relationship management:
In these circumstances, we have to give the customer an opportunity to tell us they don’t want us to use their information for that purpose. This is called an “opt-out”.
Opt-outs must be clear, easy to understand and easy for the customer to do. We can have an opt-out box on a paper-based or web application form, for example, that tells customers that if they don’t want to receive promotional material in the mail, just check here. We may want to let the customer know what they’ll be missing – special deals and new product information, for example – but don’t minimize, hide or obscure the opt-out. And don’t make it complicated, like requiring the customer to call a special phone number between certain hours. The point is to let the customer decide.
EMPLOYEE ACCESS TO CUSTOMER INFORMATION
We indicate that there are no employees in our organization who see or process information unnecessarily. This is a good practice. By limiting the number of people who view or process information we reduce the risk of inappropriate use or disclosure.
STORAGE OF PERSONAL INFORMATION: PAPER FILES
We indicated our organization does not keep any information in paper files.
In the future, if we do plan to store personal information in paper files, it is extremely important to take all measure possible in order to safely store our customer’s personal information. We should protect those files by moving them to:
A locked cabinet
A restricted area
An area with an alarm system
STORAGE OF PERSONAL INFORMATION: ELECTRONIC FILES
The following includes the types of information we may store in electronic files: E-mail
It is extremely important to take all measures possible in order to safely store our customer’s personal information. Try the following methods to protect those files by using:
Encrypted data files
Encrypted personal information that is sent or received over the Internet (by email or through web forms, for eg.)
Electronic audit trails that identify who has access information
Keeping backup files in a locked cabinet
Be especially careful with laptops, USB keys and electronic wireless devices. These types of devices can potentially store a large quantity of our customer’s personal information. All of these devices should be password protected and have the strongest form of protection possible.
COLLECTION OF SENSITIVE INFORMATION
We indicate that our organization does not collect any information that is sensitive or potentially sensitive. In the future if our organization decides to collect sensitive or potentially sensitive information consider using more than one method to ensure that it is kept confidential.
Finally, go through our old files and destroy any personal information that we no longer need in order to fulfill the purpose that we collected it for.
THIRD PARTIES LIST
We share personal information with the following third party suppliers or agents:
With No Other Parties
We’ll have to review the privacy practices of these firms to make sure they meet the same standards that we apply to our business. We should also talk to our lawyer about adding special clauses to any contracts that involve us sharing information with a third party to:
require the third party to protect our customer information
give us the power to audit the third party to make sure they’re complying with fair information practices
make sure the third party only uses the information for the purposes set out in the contract
require the third party to pass on to us any requests from customers to see their customer records