IS believes in transparency–you should be able to trust that your information and data you provide with us is kept secure and safe at all times. In order to prevent unauthorized access of your computer equipment and data, IS has physical, electronic, and managerial procedures in place; including electronic surveillance to protect your machines, and 2-tier lock systems.
When Your Information is Collected
IS provides a variety of IT related services, we’re one of the most trusted names in Utah. Your name, email, phone number, address, and internal client documentation notes are collected during your use of our services, or when purchasing products from us. This information is shared between employees at IS in a safe and secure manner.
How We Use Your Information
IS uses your information for:
▪ Keeping track of your repairs and work orders, both past and present.
▪ Internal client documentation, record keeping, accounting, auditing, and customer service evaluation.
▪ Improving our products and services.
▪ Sending computer tips and promotional material about our products and services, to your email address.
Protecting your privacy and maintaining the integrity of personal information means that:
1) We will keep your information and the business you do with us in confidence.
2) We will not sell, rent, or loan your information to third parties.
3) We will respect your privacy when we contact you concerning our various products and services.
4) You will have control over your information we use, including, how we obtain, use, and give out this information.
Retention & Destruction of Your Data:
During repairs, we may backup your data to ensure that you do not loose your important files, documents, and/or pictures. Your personal files and data are NEVER used without your strict consent. During reload of your Operating System on your computer, we may test that a couple of your files open, to ensure that your data was not corrupted during the transfer process. The testing procedures that our technicians use are closely evaluated. We may keep your data for 30-60 days, which gives our clients time to ensure that their data is all there, and at any time you may request us to dispose of your data. At the end of this period your data is permanently destroyed from our systems, and any of your physical hard drives we have, are securely wiped and then physically destroyed.
All employees, interns, business partners, and contractors of Invise Solutions are required to sign a non-disclosure agreement (NDA) with us before employment. Any information our customers and clients share with us, including personally identifiable information, project details, company trade secrets, business plans, or other sensitive learned information, will not be shared outside of Invise Solutions and it’s partners without your direct consent. Your intellectual property will not be used for any other propose other than what is necessary to complete our job as IT providers. Furthermore, our employees understand that disclosing private customer information or data may result in criminal charges. Invise Solutions strictly follows HIPPA and PCI Compliance regulations.
Use of Google’s Website Analytics
Further information concerning the terms and conditions of use and data privacy can be found at the Google Analytics Terms of Service or at the Google Analytics Privacy Overview. Please note that on this website, Google Analytics is supplemented by “gat._anonymizeIp();” to ensure anonymized collection of IP addresses (IP masking).