What Information do you collect?
During the initial consultation we will only ask you for general and basic information to better understand your situation so we can provide you with more accurate advice and cost assessment. We do not provide consultations to anyone calling from “Private”, “Restricted”, or “Unknown” or any other masked Caller ID; you must unblock your number before you place the call or it will be auto-rejected.
We will need to obtain all of the pertinent information on the person(s) that we will be investigating. We make it easy by providing you a intake sheet in which you can complete and return to us via email or in person with scheduled meeting.
What do you use my information for?
The information that we obtain pertaining your personal information will be used for billing purposes. We also will use your information for screening purposes to determine your intent for requesting our services; in other words we need to be satisfied that you are not misrepresenting your intent for requesting our assistance.
The information that we obtain on the target of our investigation will be used to aid the investigators in the field. For example we will obtain personal descriptive information such as height, weight, hair color, etc. as well as vehicle information.
How do you Protect my information?
We are committed to ensuring that your information is secure. In order to prevent unauthorized access or disclosure we have implemented suitable physical, electronic, and managerial procedures to safeguard the information that we collect. We implemented a variety of security measures to maintain the utmost care of your personal information. Our computer network has state-of-the-art hardware and software firewalls and all files are password protected. Our office is protected by multiple physical security layers including monitored alarms, surveillance system, security officer patrol and strict access control.
Do you disclose any information to third parties?
We do not sell, trade, or otherwise transfer to third parties your personally identifiable information.
Is my information Confidential?
The initial telephone consultation is confidential despite whether or not you choose to retain our services. Once you retain our services, the mere fact that you hired us is confidential, your personal information as well as the investigative findings of the case. The only time Confidentiality is eliminated/discarded is if you breach the contract and or fail to pay for our services.
What personal information do we collect from the people that visit our blog, website or app?
We do not collect information from visitors of our site.
or other details to help you with your experience.
When do we collect information?
We collect information from you when you place an order, fill out a form or enter information on our site.
How do we use your information?
We may use the information we collect from you when you make a purchase, surf the website, or use certain other site features in the following ways:
• To quickly process your transactions.
• To follow up with them after correspondence (email or phone inquiries)
How do we protect your information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use ‘cookies’?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, Some of the features that make your site experience more efficient may not function properly.that make your site experience more efficient and may not function properly.
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.
We do not include or offer third-party products or services on our website.
We have not enabled Google AdSense on our site.
California Online Privacy Protection Act
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
Can change your personal information:
• By emailing us
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It’s also important to note that we do not allow third-party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
• Within 3 business days
We will notify the users via in-site notification
• Within 3 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.