What types of information are collected?
Different types of information are collected by TCC in order to provide services to its users. All personally identifiable information is voluntarily provided by users and may include but is not limited to: names, phone numbers, email addresses, job titles, company information, mailing addresses and fax numbers.
In addition, TCC collects standard internet log information related to the usage of TCC’s website. This information may include but is not limited to: IP addresses, browser type and language, access times, use of the site and referring website addresses. Some of this information is collected through cookies (small text files stored in a user’s browser).
How is that information used?
TCC uses information provided by website users for sales, marketing and recruitment purposes. The information can be used for sending periodic emails announcing important service changes, new features, technical issue updates and news, different promotions and recruitment opportunities. The information is also used internally to improve TCC’s overall efficacy. Efforts to improve sales, marketing and recruitment strategies, as well as website layout and overall user experience can be driven by data collected through the use of the website and TCC’s services.
How is that information shared?
TCC will not disclose any personal information provided through use of the website or services to any third parties without prior written authorization to do so.
TCC may transfer personal information of its users in connection with a sale of TCC’s business.
How is that information secured?
TCC has in place reasonable commercial standards of technology and operational security to protect information provided to TCC from unauthorized access, disclosure, alteration or destruction.
Access to Information
Users may, at any time, contact TCC to verify the accuracy of their information, modify their contact preferences or request that their information be updated or deleted. TCC reserves the right to confirm a user’s identity or modify the scope and number of requests.
Changes to this Policy
Last modified on: 1 May 2014