Privacy policy
Codero Privacy Policy General: AS TEMAN is committed to protecting your privacy. This Privacy Policy will explain to you our policies for collecting, using, and disclosing personally identifiable information that you provide to us. By submitting your personally identifiable information to us you agree to the terms of this Privacy Policy. We comply with the U.S.-EU Safe Harbor Framework and the U.S.-Swiss Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union member countries and Switzerland. We have certified that we adhere to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. This Privacy Policy covers sites administered by us on behalf of customers and all information held by us and processed using systems associated with our services. This Privacy Policy and our privacy practices have been reviewed by eTrust, and have been awarded eTrust’s “PrivacyTrust Seal.”In addition, our privacy practices and this Privacy Policy comply with eTrust’s program requirements including transparency, accountability and choice regarding the collection and use of personal information. eTrust's mission, as an independent third party, is to accelerate online trust among consumers and organizations globally through its leading privacy trustmark and innovative trust solutions. Why We Collect/How We May Use Personally identifiable Information: We collect personally identifiable information in order to, among other things, (a) set up and provide services to our customers, (b) process customer payments, (c) improve our services, and (d) communicate with our customers. Customers may opt out of providing information covered by this Privacy Policy by declining to be customers. Providing this information is required to become a customer. Sources of Personally identifiable Information: We receive and collect personally identifiable information from a variety of sources as we interact with our customers and with the public. These sources include: ·E-mails, correspondence, and applications we receive from all sources. ·Cookies, URLs, web beacons, and other web identifiers we receive from visitors to our web sites. ·Credit card and credit information we receive as part of our billing and collection functions. ·Telephone calls, chat sessions, and blog postings we receive from all sources.