what personal information we collect, how it may be used, and with whom it may be shared; your options regarding the use of your information; our security procedures that protect your information from misuse; and how you can correct any inaccuracies in the information you have provided us.
Using Your Information. We may use the information that you have provided to us or that we have collected from your browser:
We may share your information with our third party business partners and service providers, such as our web hosting company and analytics providers. We may disclose personal information to comply with laws, regulations, or other legal obligations, such as to assist in an investigation, to protect and defend our rights and/or property, or the rights and/or safety of third parties, or for any additional purpose related to crime prevention. We may otherwise share your information in accordance with your consent.
You may choose to opt out of any future contact from us at any time by contacting us via the email address or phone number listed on our website. You may also contact us via the email address or phone number listed on our website in order to:
We take reasonable measures to secure and protect the information you provide and the information we automatically collect. However, we are not responsible for the security of information you transmit to us over networks that we cannot control, such as wireless networks, or information that is transmitted via a compromised device, such as a public computer or personal device with a virus.Online Encryption Protection. Wherever we collect sensitive information, such as credit card data, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in your browser’s address bar and looking for "https" at the beginning of the address of each webpage. Offline Information Protection. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job, such as fulfilling your request to schedule a consultation, are granted access to personally identifiable information. The computers and servers we use to store personally identifiable information are kept in a secure environment.