5. Your Rights and Choices
Depending on your location, you may have certain rights regarding your personal information, including:
-The right to access and receive a copy of your personal information -The right to correct or update your personal information -The right to request deletion
of your personal information -The right to object to or restrict the processing of your personal information -The right to data portability
To exercise these rights, please contact us using the information provided in the “Contact Us” section below.
4.1 Technical Measures:
We employ industry-standard encryption protocols, including Transport Layer Security (TLS), to safeguard data transmission between your device and our servers. This ensures that your information remains encrypted and protected from interception during transit.
Our systems are protected by advanced firewalls and intrusion detection systems, which are regularly updated to defend against the latest cyber threats. We also utilize robust anti-malware software across all our digital assets to prevent, detect, and remove any malicious software that could compromise data security.
Access to our databases and servers is strictly controlled through multi-factor authentication and role-based access control systems. This ensures that only authorized personnel can access sensitive information, and such access is logged and audited regularly.
We implement regular data backups and maintain secure off-site storage to ensure data recovery in the event of any unforeseen incidents. These backups are encrypted and tested periodically to verify their integrity and recoverability.
Insurance Companies: In the course of providing our emergency and restoration services, it may be necessary to share your information with insurance companies. This sharing is done solely with your explicit consent and is limited to the information required to process claims and provide the services you’ve requested. We understand the sensitive nature of insurance-related information and take great care to ensure it’s handled securely and used only for the intended purposes.
2.2.5 Data Retention and Security
The collected information is retained for a period necessary to fulfill the purposes outlined in this policy, unless a longer retention period is required or permitted by law. We implement appropriate technical and organizational measures to protect this data from unauthorized access, alteration, disclosure, or destruction.
By continuing to use our Services, you acknowledge that you have read and understood this information regarding data collection and agree to its terms. If you have any questions or concerns about this process, please contact our privacy team using the information provided in the “Contact Us” section of our Privacy Policy.
2. Information We Collect
2.1 Personal Information
We may collect personal information that you provide directly to us when you use our services. This may include:
– Name
– Email address
– Phone number
– Insurance details
– Property information
– Emergency contact information
Types of Information Collected
2.2.1 Device Information: We may automatically collect and store information about the device you use to access our Services. This includes, but is not limited to:
Internet Protocol (IP) address: A unique numerical identifier assigned to your device by your Internet Service Provider (ISP) when connected to the internet. This address may be static or dynamic and can provide general location information.
Device type: Whether you are accessing our Services via a desktop computer, laptop, tablet, smartphone, or other internet-enabled device.
Operating system: The software that manages your device’s hardware and software resources, such as Windows, macOS, iOS, Android, or others, including the specific version number.
Device settings: Various configuration settings on your device that may affect how our Services are rendered or function.
Business Transitions: In the event of a major corporate change, such as a merger, acquisition, or sale of all or a portion of our assets, your personal information may be among the assets transferred to the acquiring entity. We will notify you via email and/or a prominent notice on our website of any such change in ownership or control of your personal information. We will also outline any choices you may have regarding your information in such situations.
Service Providers: To effectively operate our business and deliver high-quality services to you, we may share your information with carefully selected service providers. These third-party vendors assist us in various aspects of our operations, such as website hosting, data analysis, customer service, and marketing efforts. We only share the information necessary for these service providers to perform their designated functions, and we ensure that they are contractually obligated to maintain the confidentiality and security of your data.
2.2.4 Methods of Collection
To collect this information, we utilize various technological methods, including but not limited to:
Server logs: Our web servers automatically record certain information each time you access our Services.
Cookies: Small text files placed on your device to store information about your preferences and activities.
Web beacons: Also known as pixel tags or clear GIFs, these are small graphics files that allow us to track your interactions.
JavaScript: A programming language that enables interactive features and can collect information about your device and interactions.
Local storage: Utilizing your browser’s or device’s local storage capabilities to store information locally.
Analytics tools: Third-party services that provide detailed insights into user behavior and device information.
2.3. Cookies and Similar Technologies
We use cookies, and similar tracking technologies to collect information about your browsing activities and to personalize your experience on our website. These technologies help us analyze trends, administer the website, track users’ movements around the website, and gather demographic information about our user base as a whole.
10. Retention of Personal Information
We will retain your personal information for as long as necessary to fulfill the purposes outlined in this Privacy Policy, unless a longer retention period is required or permitted by law.
2.2 Usage Data
In the course of your engagement with our website, mobile applications, and services (collectively referred to as “Services”), Bring The Crew, Inc may in future employ various technological mechanisms to collect and store automatically certain information related to your device and your interactions with our Services. This data collection process is an integral part of our operations, designed to enhance your user experience, improve our Services, and ensure compliance with applicable laws and regulations. By accessing or using our Services, you expressly consent to this automatic data collection as outlined herein.
Business Partners: From time to time, we may engage in joint marketing efforts or promotional activities with trusted business partners. In these cases, we may share your information with these partners, but only with your explicit consent. The shared information is used solely for the specific marketing or promotional activity you’ve agreed to, and our partners are bound by strict confidentiality agreements.
1. Introduction
Bring The Crew, Inc (“we”, “our”, or “us”) is committed to protecting your privacy and ensuring the security of your personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website or use our services. By accessing or using our services, you agree to the terms of this Privacy Policy.
Purposes of Collection
The information collected is used for various legitimate business purposes, including:
A. Improving user experience: Analyzing how users interact with our Services to make them more intuitive and efficient.
B. Service optimization: Identifying and resolving technical issues, and optimizing performance across different devices and browsers.
C. Security enhancement: Detecting and preventing fraudulent activity, unauthorized access, and other security threats.
D. Personalization: Tailoring content, recommendations, and features to individual user preferences and needs.
E. Analytics and research: Conducting statistical analyses to understand user behavior and market trends.
F. Legal compliance: Meeting regulatory requirements and responding to legal requests from authorized authorities.
G. Marketing effectiveness: Measuring the performance of our marketing campaigns and improving their efficiency.
8. Changes to This Privacy Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or for other operational, legal, or regulatory reasons. We will notify you of any material changes by posting the new Privacy Policy on this page and updating the “Last Updated” date.
7. Third-Party Links
Our website may contain links to third-party websites or services. We are not responsible for the privacy practices or content of these third-party sites. We encourage you to review the privacy policies of any third-party sites you visit.
12. Contact Us
If you have any questions, concerns, or requests regarding this Privacy Policy or our privacy practices, please contact us at: office@bringthecrew.com
Bring The Crew, Inc Contact Information Email: office@bringthecrew.com
By using our services, you acknowledge that you have read and understood this Privacy Policy and agree to its terms.
11. California Privacy Rights
If you are a California resident, you may have additional rights under the California Consumer Privacy Act (CCPA).
2.2.2 Browser Information: For web-based Services, we collect data about the web browser you are using, including:
Browser type and version: Such as Google Chrome, Mozilla Firefox, Apple Safari, or Microsoft Edge, along with the specific version number.
Browser settings: Including any customized settings or extensions that may affect how our Services function.
3. Sharing of Your Information
At ResQ, we understand the importance of your privacy and the trust you place in us when sharing your personal information. While we primarily use your data to provide and improve our services, there are certain circumstances under which we may share your information with third parties. We want to be transparent about these situations, so you can make informed decisions about using our services.
9. International Data Transfers
Your information may be transferred to and processed in countries other than the country in which you reside. These countries may have data protection laws that are different from the laws of your country. By using our services, you consent to the transfer of your information to these countries.
6. Children’s Privacy
Our services are not directed to children under the age of 13. We do not knowingly collect personal information from children under 13. If you are a parent or guardian and believe that your child has provided us with personal information, please contact us immediately.
PRIVACY POLICY
Law Enforcement and Government Agencies: There may be situations where we are legally required to disclose your information to law enforcement or government agencies. This could occur in response to a court order, subpoena, or other legal process. Additionally, we may share information if we believe it’s necessary to protect our rights, your safety, or the safety of others. We carefully review each request to ensure it’s valid and limit the information shared to only what is legally required.
4. Data Security
At Bring The Crew, Inc, we prioritize the security and confidentiality of your personal information. We understand the critical nature of the data you entrust to us, especially given the sensitive circumstances under which you may require our services. To this end, we have implemented a set of technical and organizational measures designed to protect your information throughout its lifecycle within our systems.
2.2.3 Interaction Data:
We may gather information about how you interact with our Services, including:
Pages visited: A log of all pages, sections, or screens within our Services that you access.
Time spent on pages: The duration of time you spend on each page or section of our Services.
Navigation paths: The sequence of pages you visit and the links you click within our Services.
Scroll depth: How far down a page you scroll, indicating engagement with content.
Time and date of visits: Precise timestamps of when you access our Services, including date, time, and time zone.
Referring website addresses: The Uniform Resource Locator (URL) of any website that led you to our Services through a link.
Forms submitted: Information about any forms you complete, including partial form completions.
4.4 Continuous Improvement:
We regularly review and update our security measures to adapt to evolving threats and technological advancements. This includes staying informed about the latest security standards and best practices in the industry.
While we are committed to implementing these robust security measures, it’s important to note that no method of transmission over the Internet or electronic storage is 100% secure. Despite our best efforts, we cannot guarantee absolute security of your data. Factors beyond our control, such as the inherent vulnerabilities of the Internet and potential sophisticated cyber attacks, mean that there is always a small degree of risk involved in digital data transmission and storage.
24/7 Emergency Service for Water Damage and Fire Damage
Water Damage Restoration & Mold Remediation Services
4.2 Organizational Measures:
Our employees undergo comprehensive security awareness training upon hiring and receive regular updates on the latest security best practices and potential threats. This training covers topics such as password hygiene, phishing awareness, and the proper handling of sensitive information.
We have established a dedicated information security team responsible for overseeing our security protocols, conducting regular risk assessments, and implementing necessary improvements to our security infrastructure.
Our internal policies and procedures are designed to ensure the principle of least privilege, meaning employees are only granted access to the minimum amount of data necessary to perform their job functions.
We conduct regular security audits and vulnerability assessments, including penetration testing by third-party security experts, to identify and address any potential weaknesses in our systems.
Follow Me
4.3 Incident Response:
In the unlikely event of a data breach, we have a comprehensive incident response plan in place. This includes procedures for prompt notification of affected individuals and relevant authorities, as required by applicable laws.
Copyright © Bring The Crew. All rights reserved.