Privacy Policy
Last updated: 21 Feb 2023, 1:33 pm EST
We value your privacy very highly. Please read this Privacy Policy carefully before using the www.centralmasssoftware.com Website (the "Site") operated by CentralMassSoftware Development, LLC, a(n) Limited Liability Company formed in Massachusetts, United States ("us," "we," "our") as this Privacy Policy contains important information regarding your privacy and how we may use the information we collect about you.
Your access to and use of the Website is conditional upon your acceptance of and compliance with this Privacy Policy. This Privacy Policy applies to everyone, including, but not limited to: visitors, users, and others, who wish to access or use the Site.
By accessing or using the Site, you agree to be bound by this Privacy Policy. If you disagree with any part of the Privacy Policy, then you do not have our permission to access or use the Website.
Personal Information We May Collect
All personally identifying information is provided voluntarily by Site visitors. We do not require provision of personally identifiable information to use this Site.
When completing forms on this site to subscribe to announcements and newsletters or to contact us, we may ask for personally identifying information including name, business name, email addresses and phone numbers. By providing the information on this Site, the user has provided content to the storage and processing of their information. We may use this information for marketing and advertising, performing services, providing customer service, and verifying customer information.
With Whom We Share Your Personal Information
We do not share your personal information with any third parties.
Sale of Your Information
We do not sell your personal information.
How We Protect Your Personal Information
We have implemented the following measures to protect and safeguard your personal information:
Limiting the amount of personal information that we collect to strictly necessary only;
Using ssl or other secure connection technologies when receiving or sending personal information beyond internal networks;
Destroying the personal information that we no longer need;
Maintaining up-to-date software and safeguards.