Collecting and Using Personal Information
Any information collected within the context of your email inquiry or comment is used only for the expressed purpose of responding to your inquiry or comment. We collect personally identifiable information only if specifically and knowingly provided by you.
You should also be aware that when you visit our website, we collect certain information that does not identify you personally, but provides us with “usage data,” such as the number of visitors we receive or what pages are visited most often. This data helps us to analyze and improve the usefulness of the information we provide at these websites. Like most commercial website owners, we may also use what is known as “cookie” technology. A “cookie” is an element of data that a website can send to your browser when you link to that website. It is not a computer program and has no ability to read data residing on your computer or instruct it to perform any step or function. By assigning a unique data element to each visitor, the website is able to recognize repeat users, track usage patterns and better serve you when you return to that site. The cookie does not extract other personal information about you, such as your name or address. Most browsers provide a simple procedure that will enable you to control whether you want to receive cookies by notifying you when a website is about to deposit a cookie file.
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline. Wherever we collect sensitive information, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser or looking for "https" at the beginning of the address of the web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only CTC Group employees who need the information to perform a specific job (for example, new hire on-boarding) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.
Changes to This Statement