Data we collect and the way we use it:
INFORMATION WE COLLECT: We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes your email address(es), your business(es)’ physical and mailing locations, personal and/or business cellular telephone numbers, IP (Internet Protocol) addresses, software licensing information (eg: Windows licensing information), hardware serial numbers (in the event of new products provided by GEEK HOUSECALLS LLC within the scope of a technology systems installation, or when such is gathered during a technology systems audit, also referred to as an ‘IT audit’), which you submit to us through the registration process at the Site.
I. Information collected via Technology
To use our website, hereafter referred to as “the Service”, you do not need to submit any Personal Information other than your email address. To use the Service thereafter, you do not need to submit further Personal Information.
Ia. However, in an effort to improve the quality of the Service, we track information provided to us by your browser or by our software application when you view or use the Service, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you.
Ib. We track this information using cookies, or small text files which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis.
Id. For example, we store a persistent cookie to track user preferences, sign-in information (if so desired), and other user-selected settings. Persistent cookies are stored on your device and may be deleted at any time, by way of your browser’s settings menu.
II. Information you provide us by registering for an account In addition to the information provided automatically by your browser when you visit the Site, to become a subscriber to the Service you will need to create a personal profile. You can create a profile by registering with the Service and entering your email address, and creating a user name and a password.
IIb. Children’s Privacy (Compliance with COPPA)The Site and the Service are not directed to anyone under the age of 13. The Site does not knowingly collect or solicit information from anyone under the age of 13, or allow anyone under the age of 13 to sign up for the Service. In the event that we learn that we have gathered personal information from anyone under the age of 13 without the consent of a parent or guardian, we will delete that information as soon as possible. If you believe we have collected such information, please contact us at firstname.lastname@example.org
III. WAYS WE USE AND SHARE INFORMATION
IIIa. In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support, and inform users about promotional offers. We may share Personal Information with outside parties if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to meet any applicable legal process or enforceable governmental request; to enforce applicable Terms of Service, including investigation of potential violations; address fraud, security or technical concerns; or to protect against harm to the rights, property, or safety of our users or the public as required or permitted by law.
IV. HOW WE PROTECT INFORMATION
Pertaining to our website and other web services: We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks. It is incumbent upon each client to perform their own due diligence in implementing security 'best practices' while using any online or digital platform.
IVa. Pertaining to on-site, remote, and other contract, maintenance, or retainer work provided by the Company: No user data are stored unless the customer requests that it is stored. All data that are stored are protected by security best practices, including secure passwords (longer than 16 alphanumeric characters, randomly generated), software and hardware encryption, multifactor authentication, virtualization/isolation, and physical security measures including locking any customer equipment that contains user data (personally identifiable information) and/or has otherwise not been formatted or sanitized.
IVb. In the event that factors outside of the Company’s control, such as a website or web service hack or data breach, compromise a customer’s personally identifiable information, the Company assumes no legal responsibility for identity theft, fraud, unauthorized financial transactions, or other issues arising from said factors. We ask that you understand that we cannot control the practices of upstream service providers or vendors. We work diligently to protect your data and will not work with software or hardware vendors whose track records for protecting user data is poor.
IVc. Geek Housecalls uses ConnectWise for remote monitoring and management, which provides RMM and PSA (professional services automation) products to managed service providers, help desks, universities, governments, and IT support departments of other descriptions. ConnectWise uses remote desktop technology, which facilitates direct connections from us (Geek Housecalls), to you, the customer. Each of these remote support sessions is encrypted. Read more about ConnectWise's privacy and data usage policies here: https://www.connectwise.com/company/trust/privacy/data-usage
V. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
Va. YOUR RIGHT TO BE FORGOTTEN
If, during or after any interaction with Geek Housecalls in which personally identifiable information (PII) is collected about you, the client, you wish to have this information erased from Geek Housecalls's internal database, please submit your request to Matt at email@example.com. Any personally identifiable information, such as full name, address, phone number, email address, date of birth, and/or any billing information, will be deleted within 3 business days. Geek Housecalls will provide an emailed receipt of any data collected that has been removed from our systems. Your right to secure your digital footprint is important to us.
VI. LINKS TO OTHER WEBSITES
VIII. CONTACT US