Changes for document UNIMAS Now Privacy Policy

Last modified by Mohamad Roffizal Bin Romali on 2017/02/15 14:24
From version 4.1
edited by Mohamad Roffizal Bin Romali
on 2017/02/15 14:22
To version 5.1
edited by Mohamad Roffizal Bin Romali
on 2017/02/15 14:24
Change comment: There is no comment for this version

Content changes

... ... @@ -8,26 +8,22 @@
8 8
9 9 **When do we collect information?**
10 10
11 -We collect information from you when you or enter information on our site.
11 +We collect information from you on the first time login.
12 12
13 -First time login
14 14
15 15 **How do we use your information?**
16 16
17 17 We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
18 18
19 - **•** To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
18 + **•** To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
20 20
21 - **•** To allow us to better service you in responding to your customer service requests.
20 + **•** To allow us to better service you in responding to your customer service requests.
22 22
22 +
23 23 **How do we protect your information?**
24 24
25 -We do not use vulnerability scanning and/or scanning to PCI standards.
26 -
27 27 We only provide articles and information. We never ask for credit card numbers.
28 28
29 -We do not use Malware Scanning.
30 -
31 31 Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
32 32
33 33 We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
... ... @@ -34,6 +34,7 @@
34 34
35 35 All transactions are processed through a gateway provider and are not stored or processed on our servers.
36 36
33 +
37 37 **Do we use 'cookies'?**
38 38
39 39 We do not use cookies for tracking purposes
... ... @@ -44,14 +44,17 @@
44 44
45 45 However, you will still be able to place orders .
46 46
44 +
47 47 **Third-party disclosure**
48 48
49 49 We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.
50 50
49 +
51 51 **Third-party links**
52 52
53 53 We do not include or offer third-party products or services on our website.
54 54
54 +
55 55 **Google**
56 56
57 57 Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https:~/~/support.google.com/adwordspolicy/answer/1316548?hl=en
... ... @@ -58,18 +58,21 @@
58 58
59 59 We have not enabled Google AdSense on our site but we may do so in the future.
60 60
61 +
61 61 **Fair Information Practices**
62 62
63 63 The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
64 64
66 +
65 65 **In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:**
66 66
67 67 We will notify you via email
68 68
69 - **•** Within 7 business days
71 + **•** Within 7 business days
70 70
71 71 We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
72 72
75 +
73 73 **Contacting Us**
74 74
75 75 If there are any questions regarding this privacy policy, you may contact us using the information below.

Start Here

Welcome to the UNIMAS WIKI.
To start, use search function by entering keywords in the search box below :
 

Quick Navigation

About UNIMAS

HOW-TO, Tutorial & User Manual

HOW-TO, Tutorial & User Manual

Macros

STB2242 - PLANT BIOTECHNOLOGY

Semester Registration

signatureattach

Recently Created

Recently Modified

My Recent Modifications


This wiki is licensed under a Creative Commons 2.0 license
XWiki Enterprise 5.0.3 - Documentation