What information does Mercury Technology collect?
For Site users ("Clients"), during registration we ask for personal information including your name, company name, address, zip/postal code, email address, phone and job function, as well as other personal information. If you contact Mercury Technology, we may keep a record of that correspondence. In addition, Mercury Technology reserves the right to collect information about you in general, which does not necessarily identify you, using our server log files and some of the methods described under "cookies" below.
What about Mercury Technology's linked sites?
If you have questions about the privacy policies of other Web sites linked from our Site, we encourage you to contact those other Web sites directly.
Why does Mercury Technology gather this information?
Mercury Technology's primary goal in collecting personal information is to validate access to our operational systems and to provide a customized user experience. This includes personalization services, service request communications, change approvals, and many other types of services. By knowing a little about you, Mercury Technology is able to validate access to your information and deliver better service and more relevant content to our Site users.
How does Mercury Technology use my information?
With respect to Clients, Mercury Technology uses your information to enable you to take advantage of the features available through the Site. Once you register, you are no longer anonymous to Mercury Technology: you are given a User Account and are able to take full advantage of Mercury Technology's Application features. Additional information you volunteer enables us to better customize your experience. We may also use your contact information to reach you regarding important issues about the use of our service. We use other information we collect to get a better understanding of our Clients and there level of satisfaction with our service. Some information that we collect through your use of the Site may be analyzed on an aggregate basis, and is not intended to identify individual Clients.
We use information that we collect from you when you email us for the sole purpose of corresponding with you. Mercury Technology reserves the right to keep records of any correspondence and information provided by you.
With whom, and how, does Mercury Technology share my information?
What are my choices regarding the use of my information?
When you access parts of the Site, you can choose whether or not you want to receive information from us. If you want to receive information from us, please be sure to indicate that you do when you are prompted. You also may have choices about whether you want to receive information when you visit and provide information to other Web sites, including sites accessible through this Site. Mercury Technology does not take any responsibility for information you may or may not receive from other Web sites.
What are "cookies" and how does Mercury Technology use them?
A "cookie" is a small amount of data that is sent to your browser from a Web server and gets saved on your computer hard drive temporarily. These cookie files store and sometimes track information about what you do on the Site. This information makes it possible for us to offer and provide highly customized services.
Generally, we use, or may use in the future, cookies to:
- Remind us of who you are and to access your profile (stored on our computers) in order to deliver to you a better and more personalized service. These cookies are usually set when you provide us with information about you and are modified when you "Log Out" of the Site.
- Assist Mercury Technology to track usage of the Site. This information collected by cookies is sometimes called "clickstream" or "click trail" and may also describe which pages you have seen in each section of the Site.
- Measure certain traffic patterns. Determine which areas of the Site you have visited and your visiting patterns in the aggregate. We may use this research to understand how our users' habits are similar or different from one another so that we can make each new experience on Mercury Technology a better one. We may use this information to better personalize the content, banners, and information that you and other users will see on our Site.
I'd rather not have cookies stored on My computer. Is there any way to work around them?
By modifying your browser preferences you can choose to accept all cookies, be notified when a cookie is set, or to reject all cookies. The "help" portion of the toolbar on most browsers will tell you how to do this. If you choose to reject all cookies, however, you may be unable to use portions of the Mercury Technology system.
I am a Client and want to cancel my Mercury Technology web site account. How can I do so?
Your Mercury Technology web site account can be terminated at anytime by providing Mercury Technology with written, email or telephone notification of your desire to terminate your account. Once you do so, however, you won't be able to access any Client-only area of the Site. If you have any questions about this process, email us at firstname.lastname@example.org (be sure to provide your Mercury Technology Username and Password).
What kinds of security precautions are in place to protect my information from hackers or prying eyes?
Your Mercury Technology account is password protected so that you - and only select Mercury Technology administration personnel - have access. We recommend that you do not divulge your password to anyone. Also remember to sign out of your Mercury Technology account and close your browser window when you have finished your work. This is to prevent others from accessing your personal information if you share a computer with someone else or use a workstation in a public place. It may on occasion be necessary for Mercury Technology employees or contractors working on behalf of Mercury Technology to have access to your profile to provide you with support or to perform certain maintenance tasks. This access happens on an as-needed basis only.
We use security technology to ensure that your personal data remains private within the Site. While no data transmission over the Internet can be guaranteed to be 100% secure, Mercury Technology strives to protect your personal information, but cannot ensure or warrant the security of any information you transmit to us or from our online products or services.
What else should I know about my privacy?
Please keep in mind that whenever you voluntarily disclose personal information online--for example on message boards, through email or in chat areas--that information can be collected and used by others. In short, if you post personal information online that is accessible to the public, you may receive unsolicited messages from other parties in return.
Ultimately, you are responsible for maintaining the secrecy of your personal information, passwords or profiles.
Please be careful and responsible whenever you're online.
Safe Harbor: Mercury Technology Group has established a global customer base, and has developed global data practices designed to assure your personal data is appropriately protected. MTG’s privacy practices, including the practices addressed in this policy and those applicable to its services businesses, are self-certified to the United States/European Union Safe Harbor Program. and the United States/Swiss Safe Harbor Program as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union and Switzerland respectively. For more information about Safe Harbor or to access MTG’s certification statement, go to http://www.export.gov/safeharbor/.
CUSTOMER INFORMATION AND SERVICES DATA
Services Data is data that resides on MTG, customer or third-party systems to which MTG is provided access to perform services (including hosting environments as well as test, development and production environments that may be accessed to perform MTG consulting and support services). MTG treats services data according to the terms of this policy, and treats services data as confidential in accordance with the terms of your SLA for services.
In contrast, having contracted with MTG for hosted or other services, the customer then provides MTG with access to its production, development or test environment, which may include personal information about its employees, customers, partners or suppliers (collectively "end users").
HOW WE COLLECT AND USE SERVICES DATA
Below are the conditions under which MTG may access, collect and/or use services data.
To Provide Services. Services data may be accessed and used to fulfill the requirements specified in your order for support, consulting, hosting or other services.
To Maintain and Upgrade a System. Technical staff may require periodic access to services data to monitor system performance, test systems and develop and implement upgrades to systems. Any temporary copies of services data created as a necessary part of this process are only maintained for time periods relevant to those purposes.
To Address Performance and Fix Issues. On occasion, MTG may develop new versions, patches, updates, and other fixes to its programs and services (such as security patches addressing newly discovered vulnerabilities). In accordance with the terms of your order for services and/or with notice to you, we may access and/or use a copy of your test, development or production environment, including services data, to test such new versions, patches, updates and fixes and validate that they work in your environment(s).
As a Result of Legal Requirements. MTG may be required to provide personally identifiable information to comply with legally mandated reporting, disclosure or other legal process requirements.
MTG does not use services data except as stated above or in your order. MTG may process services data, but does not control your information collection or use practices for services data. If you provide any services data to MTG, you are responsible for providing any notices and/or obtaining any consents necessary for MTG to access and use services data as specified in this policy and your order.
MTG's access to services data is based on job role/responsibility. Services data residing in MTG hosted systems is controlled via an access control list (ACL) mechanism, as well as the use of an account management framework. You control access to services data by your end users; end users should direct any requests related to their personal information to you.
SECURITY AND BREACH NOTIFICATION
MTG is committed to the security of your services data, and has in place physical, administrative and technical measures designed to prevent unauthorized access to that information. MTG security policies cover the management of security for both its internal operations as well as the services. These policies, which are aligned with the ISO/IEC 17799:2005 and ISO/IEC 27001:2005 standards, govern all areas of security applicable to services and apply to all MTG employees.
MTG’s security policies and procedures are reviewed by the MTG’s Information Security Team (IST) and reviewed as part of our SSAE-16 compliance audit. The MTG Information Security Team coordinates implementation of security wide programs, including security policies and data privacy standards. Executive management and the IST are responsible for security oversight, compliance and enforcement, and for conducting information security assessments and leading the development of information security policy and strategy.
MTG is also committed to reducing risks of human error, theft, fraud, and misuse of MTG facilities. MTG’s efforts include making personnel aware of security policies and training employees to implement security policies. MTG employees are required to maintain the confidentiality of services data. Employees' obligations include written confidentiality agreements and compliance with company policies concerning protection of confidential information.
MTG promptly evaluates and responds to incidents that create suspicions of unauthorized handling of services data. MTG’s IST and Executive Team are informed of such incidents and, depending on the nature of the activity, defines escalation paths and response teams to address the incidents. If MTG determines that your services data has been misappropriated (including by an MTG employee), MTG will promptly report such misappropriation to you in accordance with our incident response policies.
If you believe your services data has been used in a way that is not consistent with this policy, or if you have further questions related to this policy, please email at email@example.com