Loading...

Privacy Policy

In this Privacy Policy ("Policy"), we, Rapidtek (collectively "we", "us", or "our"), provide information about how we collect, use, process, and transfer personal data. We are committed to protecting your personal information and treating the handling of personal data seriously.

PLEASE READ THIS PRIVACY POLICY CAREFULLY TO UNDERSTAND HOW WE HANDLE YOUR INFORMATION. IF YOU DO NOT AGREE TO THIS PRIVACY POLICY, PLEASE DO NOT USE THE SERVICES.

By visiting Rapidtek.net, you consent to the practices described in this Privacy Policy. We may modify this Privacy Policy at any time. Your continued use of our products and services and Rapidtek.net constitutes your acceptance of this Privacy Policy and any updates.

1.THE INFORMATION WE COLLECT
We collect a variety of information that you provide directly to us. For example, we collect information from you through:
• Accessing or using our website, software, or other online services that link to or otherwise present this Privacy Policy to you.
• Filling out a form.
• Downloading a datasheet.
• Communicating with us via third-party social media sites.
The types of data we collect directly from you include:
• Name, email address, position.
• Information about your customer service and maintenance interactions with us.
• Other information you choose to provide.
When you use our websites and our service providers (which are third-party companies that work on our behalf), you may use a variety of technologies, including cookies and similar tools, to assist in collecting. We collect and analyze information such as your IP address, browser types, browser language, operating system, the state or country from which you accessed the Services, software and hardware attributes (including device IDs), referring and exit pages and URLs, platform type, the number of clicks, files you download, domain names, landing pages, pages viewed and the order of those pages, the amount of time spent on particular pages, the terms you use in searches on our sites, the date and time you used the Services and uploaded or posted content, error logs, and other similar information.

2.HOW WE USE YOUR INFORMATION
Where permitted by applicable law, we use your information (including any information that we collect, as described in this Privacy Policy) for various purposes depending on the types of information we have collected from and about you and the specific Services you use, in order to:
• Respond to your correspondence.
• Provide you with the Services.
• Help you complete a transaction or order.
• Provide updates on service and benefits.
• Personalize our website for your needs.
• Conduct market research to help us better meet our customers’ needs.
• Provide and monitor the effectiveness of our website.
• Monitor aggregate metrics such as the total number of visitors, traffic, and demographic patterns.
• Diagnose or fix technology problems.
• Provide advertising for our products and services to you online or by email.
• Provide usage reporting to our customers.
If you choose not to provide this information, we may be unable to provide the corresponding services or respond to your inquiries. By disclosing your personal information via the website, over the telephone, or via email or post, you consent to the collection, storage, and processing of your personal information by us in the manner set out in this Privacy Policy and the Terms of Use Policy.

3.HOW WE SHARE THE INFORMATION
We may disclose your data to certain permitted third parties, such as members of our group, our own professional advisers who are bound by confidentiality codes, and when we are legally obliged to disclose your data.
Except under the circumstances described above, we will not sell, rent, or trade your personal information to third parties for marketing purposes without your express consent. We will only pass your data to other third parties in accordance with this Privacy Policy or the Terms of Use, or if required to do so by law.
If we were to undergo a reorganization, merger, or sale of all or a part of our assets, we could transfer ownership, which could include the transfer of your personal data directly related to that business to the purchasing person or company.
Any non-personally identifiable communication or material you transmit to us over this website, by electronic mail, or otherwise, including any data, questions, comments, or suggestions, will be treated as non-confidential and non-proprietary. We may use anything you transmit or post to our affiliates for any purpose, including but not limited to reproduction, disclosure, transmission, publication, broadcast, and posting. Furthermore, we are free to use any ideas, concepts, know-how, or techniques contained in any communication you send to this website for any purpose whatsoever, including but not limited to developing, manufacturing, and marketing products using such information.

4.HOW WE PROTECT YOUR INFORMATION
We appreciate your trust in sharing your personal information with us; the security of your personal data is our highest priority. We have taken steps to protect your personal data by limiting access to our network where your data is stored. It is our policy to maintain the integrity of any personal data in our possession. However, no method of transmission over the internet, and no means of electronic or physical storage, is absolutely secure. As such, you acknowledge and accept that we cannot guarantee the security of your information transmitted to, through, or on our Services or via the Internet and that any such transmission is at your own risk.

5.COOKIE
Cookies are typically small text files that may be stored on your computer's browser directory or program data subfolders when you use that device to visit a website. Cookies are widely used by website owners to make their websites operate, work more efficiently, and provide analytic information. Cookies themselves do not typically contain personal information, but when they are read by a browser, they can help a website improve the service delivered.
How we use cookies
To collect the information in the “Information We Automatically Collect” section above, we and our service providers use Internet server logs, cookies, tags, SDKs, tracking pixels, and other similar tracking technologies. Cookies are small data files that the Site places on your computer or mobile device. We use these technologies to offer you a more tailored experience in the future by understanding and remembering your particular browsing preferences. Using these cookies helps us deliver the best web experience for you and to understand what our readers are looking at so that we can produce more of the right kind of content. Our use is subject to Google’s current cookie policy, which you can find here. We do not use cookies to track your internet browsing activities before or after you visit the Site.
By browsing and using our website, you consent to the above cookies being used in the way described in this Privacy Policy. If you do not consent, you can disable cookies by adjusting your browser settings or stop using the site.

6.YOUR CHOICES
• Request for erasure, restriction of processing, and portability of your personal data.
• Request data corrections of any incorrect or incomplete data.
• Request to be removed from our databases and systems.
• Opt-out or unsubscribe from all non-essential emails by using the unsubscribe option at the foot of all our commercial communications.
If you wish to access or modify your personal information, or if you wish to discontinue receiving materials from us or wish to remove your personal information from our database, you can contact us at service@rapidtek.net.

7.RAPIDTEK CONTACT INFORMATION
If you have any questions about or complaints in relation to this Privacy Policy, please email us at service@rapidtek.net.

Information Security Policy

1. Company executives actively participate in information security management activities, supporting and committing to information security through appropriate standards and procedures to implement this policy.
2.  We strictly comply with relevant information security laws, including the General Data Protection Regulation, Copyright, and Electronic Signature.
3. To ensure effective information security, we have established an Information Security Management System (ISMS) based on current industry standards.
4. All employees adhere to our information security regulations to ensure appropriate use of company resources.
5. Our reporting mechanism should be followed to report any identified information security incidents or vulnerabilities.
6. Comprehensive response measures are in place to ensure the continuity of information systems and business operations in the event of a security incident.
7. A business continuity plan for information security is in place and tested regularly to ensure critical systems and operations can be restored within the expected timeframe during disasters.
8. When processing personal data, we adhere to the General Data Protection Regulation and relevant regulations, ensuring data is handled cautiously and prohibiting unauthorized collection, disclosure, or use outside of business purposes.
9. Only licensed software is used, and downloading software from unverified sources is strictly prohibited.
10. External vendors must comply with this policy and related procedures, refraining from unauthorized use or misuse of any company information assets.
11. Employees receive regular information security training and awareness programs to enhance information security awareness.
12. Regular information security audits are conducted to assess access controls and ensure the effectiveness of our information security management system.
13. Access permissions to critical information infrastructure are differentiated and granted based on job roles. Encryption and identity verification mechanisms are implemented when necessary to strengthen the security of information assets.
14. Any actions that endanger our information security will be addressed according to the severity, with possible civil, criminal, or administrative consequences, or disciplinary measures per company policies.