Mercury Technology Privacy Policy

Mercury Technology is committed to safeguarding your privacy online and we strive to make this Internet site ("Site") as safe and secure as reasonably possible. In order to address your most frequently asked questions, we've organized our privacy policy statement in a question and answer format. If you have any questions after reading this statement, please contact -

What information does Mercury Technology collect?

For Site users ("Clients"), during registration we ask for personal information including your name, company name, address, zip/postal code, email address, phone and job function, as well as other personal information. If you contact Mercury Technology, we may keep a record of that correspondence. In addition, Mercury Technology reserves the right to collect information about you in general, which does not necessarily identify you, using our server log files and some of the methods described under "cookies" below.

What about Mercury Technology's linked sites?

This Site may contain links to other Web sites. In the event that you obtain products and/or services from these other Web sites, you may be on another company's Web site. When ordering, registering for or purchasing products or services from these Web sites, you will be entering into an agreement with that Web site and not with Mercury Technology. In these cases, this privacy policy does not apply; instead, the privacy policy of the Web site actually providing the goods or services will apply. We urge you to read and understand the privacy policies of other Web sites before entering into agreements with them. We are committed to associating with companies that share our privacy concerns. Mercury Technology, however, cannot control the way these other Web sites collect or use information.

Also, when you click through to a Web site linked from this Site, those Web sites may use cookies or other means to collect information about you. Again, Mercury Technology's privacy policy does not apply to those Web sites; instead, the privacy policy of the Web site that you visit will apply.

If you have questions about the privacy policies of other Web sites linked from our Site, we encourage you to contact those other Web sites directly.

Why does Mercury Technology gather this information?

Mercury Technology's primary goal in collecting personal information is to validate access to our operational systems and to provide a customized user experience. This includes personalization services, service request communications, change approvals, and many other types of services. By knowing a little about you, Mercury Technology is able to validate access to your information and deliver better service and more relevant content to our Site users.

How does Mercury Technology use my information?

With respect to Clients, Mercury Technology uses your information to enable you to take advantage of the features available through the Site. Once you register, you are no longer anonymous to Mercury Technology: you are given a User Account and are able to take full advantage of Mercury Technology's Application features. Additional information you volunteer enables us to better customize your experience. We may also use your contact information to reach you regarding important issues about the use of our service. We use other information we collect to get a better understanding of our Clients and there level of satisfaction with our service. Some information that we collect through your use of the Site may be analyzed on an aggregate basis, and is not intended to identify individual Clients.

We use information that we collect from you when you email us for the sole purpose of corresponding with you. Mercury Technology reserves the right to keep records of any correspondence and information provided by you.

With whom, and how, does Mercury Technology share my information?

Mercury Technology uses information that it gathers from you only for internal business purposes. This information is not shared with any other entities or individuals. Mercury Technology may disclose information in special cases when we have reason to believe that disclosing this information is necessary to identify, contact or bring legal action against someone who may be violating Mercury Technology's Terms of Use. The same policy applies in cases where we believe an individual may be causing injury to or interference with (either intentionally or unintentionally) Mercury Technology's rights or property, other Site users, or anyone else that could be harmed by such activities. Mercury Technology may disclose or access account information when we believe in good faith that the law requires it and for administrative and other purposes that we deem necessary to maintain, service and improve our products and services.

What are my choices regarding the use of my information?

When you access parts of the Site, you can choose whether or not you want to receive information from us. If you want to receive information from us, please be sure to indicate that you do when you are prompted. You also may have choices about whether you want to receive information when you visit and provide information to other Web sites, including sites accessible through this Site. Mercury Technology does not take any responsibility for information you may or may not receive from other Web sites.

What are "cookies" and how does Mercury Technology use them?

A "cookie" is a small amount of data that is sent to your browser from a Web server and gets saved on your computer hard drive temporarily. These cookie files store and sometimes track information about what you do on the Site. This information makes it possible for us to offer and provide highly customized services.

    Generally, we use, or may use in the future, cookies to:
  1. Remind us of who you are and to access your profile (stored on our computers) in order to deliver to you a better and more personalized service. These cookies are usually set when you provide us with information about you and are modified when you "Log Out" of the Site.
  2. Assist Mercury Technology to track usage of the Site. This information collected by cookies is sometimes called "clickstream" or "click trail" and may also describe which pages you have seen in each section of the Site.
  3. Measure certain traffic patterns. Determine which areas of the Site you have visited and your visiting patterns in the aggregate. We may use this research to understand how our users' habits are similar or different from one another so that we can make each new experience on Mercury Technology a better one. We may use this information to better personalize the content, banners, and information that you and other users will see on our Site.

I'd rather not have cookies stored on My computer. Is there any way to work around them?

By modifying your browser preferences you can choose to accept all cookies, be notified when a cookie is set, or to reject all cookies. The "help" portion of the toolbar on most browsers will tell you how to do this. If you choose to reject all cookies, however, you may be unable to use portions of the Mercury Technology system.

I am a Client and want to cancel my Mercury Technology web site account. How can I do so?

Your Mercury Technology web site account can be terminated at anytime by providing Mercury Technology with written, email or telephone notification of your desire to terminate your account. Once you do so, however, you won't be able to access any Client-only area of the Site. If you have any questions about this process, email us at (be sure to provide your Mercury Technology Username and Password).

What kinds of security precautions are in place to protect my information from hackers or prying eyes?

Your Mercury Technology account is password protected so that you - and only select Mercury Technology administration personnel - have access. We recommend that you do not divulge your password to anyone. Also remember to sign out of your Mercury Technology account and close your browser window when you have finished your work. This is to prevent others from accessing your personal information if you share a computer with someone else or use a workstation in a public place. It may on occasion be necessary for Mercury Technology employees or contractors working on behalf of Mercury Technology to have access to your profile to provide you with support or to perform certain maintenance tasks. This access happens on an as-needed basis only.

We use security technology to ensure that your personal data remains private within the Site. While no data transmission over the Internet can be guaranteed to be 100% secure, Mercury Technology strives to protect your personal information, but cannot ensure or warrant the security of any information you transmit to us or from our online products or services.

What else should I know about my privacy?

As Mercury Technology expands its offerings, we will update our Privacy Policy to address these changes. Please check this page on a regular basis for updates to this Privacy Policy. We will make reasonable efforts to alert you to any changes in this Privacy Policy by posting the fact that it has been "updated" conspicuously on the Site.

In addition, information we obtain from voluntary programs such as surveys, promotions and contests may be subject to additional or different terms, or may be used in a slightly different way. If different terms do apply, details of the use of this information will be outlined in the specific terms and conditions or rules of these special surveys, promotions or contests. Please be sure to read those specific terms and conditions or rules because they may alter what is written in this Privacy Policy on a case-by-case basis.

Please keep in mind that whenever you voluntarily disclose personal information online--for example on message boards, through email or in chat areas--that information can be collected and used by others. In short, if you post personal information online that is accessible to the public, you may receive unsolicited messages from other parties in return.

Ultimately, you are responsible for maintaining the secrecy of your personal information, passwords or profiles.

Please be careful and responsible whenever you're online.

Services Privacy Policy


This policy covers the privacy practices that Mercury Technology Group employs when providing support, consulting, hosting or other services (the "services") to our customers. MTG established this privacy policy in order to clarify that the use of information to which it may be provided access in order to provide services is more limited than the use of information covered by Mercury Technology Group's general privacy policy. Safe Harbor: Mercury Technology Group has established a global customer base, and has developed global data practices designed to assure your personal data is appropriately protected. MTG's privacy practices, including the practices addressed in this policy and those applicable to its services businesses, are self-certified to the United States/European Union Safe Harbor Program. and the United States/Swiss Safe Harbor Program as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union and Switzerland respectively. For more information about Safe Harbor or to access MTG's certification statement, go to


Customer Information is information that we may collect from your use of the Web sites and your interactions with us off-line. We deal with customer information according to the terms of our general privacy policy.

Services Data is data that resides on MTG, customer or third-party systems to which MTG is provided access to perform services (including hosting environments as well as test, development and production environments that may be accessed to perform MTG consulting and support services). MTG treats services data according to the terms of this policy, and treats services data as confidential in accordance with the terms of your SLA for services.

To illustrate the difference between customer information and services data, when a customer contracts with MTG for services, the customer provides information about itself, including its name, address, billing information, and contact information. MTG's Web sites may also collect some information about the customer and some employees as part of that interaction. All of that information is customer information, and is treated according to MTG's general privacy policy.

In contrast, having contracted with MTG for hosted or other services, the customer then provides MTG with access to its production, development or test environment, which may include personal information about its employees, customers, partners or suppliers (collectively "end users").


Below are the conditions under which MTG may access, collect and/or use services data.

To Provide Services. Services data may be accessed and used to fulfill the requirements specified in your order for support, consulting, hosting or other services.

To Maintain and Upgrade a System. Technical staff may require periodic access to services data to monitor system performance, test systems and develop and implement upgrades to systems. Any temporary copies of services data created as a necessary part of this process are only maintained for time periods relevant to those purposes.

To Address Performance and Fix Issues. On occasion, MTG may develop new versions, patches, updates, and other fixes to its programs and services (such as security patches addressing newly discovered vulnerabilities). In accordance with the terms of your order for services and/or with notice to you, we may access and/or use a copy of your test, development or production environment, including services data, to test such new versions, patches, updates and fixes and validate that they work in your environment(s).

As a Result of Legal Requirements. MTG may be required to provide personally identifiable information to comply with legally mandated reporting, disclosure or other legal process requirements.

MTG may transfer and access services data globally as required for the purposes specified above. If MTG hires subcontractors to assist in providing services, their access to services data will be consistent with the terms of your order for services and this services privacy policy.

MTG does not use services data except as stated above or in your order. MTG may process services data, but does not control your information collection or use practices for services data. If you provide any services data to MTG, you are responsible for providing any notices and/or obtaining any consents necessary for MTG to access and use services data as specified in this policy and your order.


MTG's access to services data is based on job role/responsibility. Services data residing in MTG hosted systems is controlled via an access control list (ACL) mechanism, as well as the use of an account management framework. You control access to services data by your end users; end users should direct any requests related to their personal information to you.

MTG is committed to the security of your services data, and has in place physical, administrative and technical measures designed to prevent unauthorized access to that information. MTG security policies cover the management of security for both its internal operations as well as the services. These policies, which are aligned with the ISO/IEC 17799:2005 and ISO/IEC 27001:2005 standards, govern all areas of security applicable to services and apply to all MTG employees.

MTG's security policies and procedures are reviewed by the MTG's Information Security Team (IST) and reviewed as part of our SSAE-16 compliance audit. The MTG Information Security Team coordinates implementation of security wide programs, including security policies and data privacy standards. Executive management and the IST are responsible for security oversight, compliance and enforcement, and for conducting information security assessments and leading the development of information security policy and strategy.

MTG is also committed to reducing risks of human error, theft, fraud, and misuse of MTG facilities. MTG's efforts include making personnel aware of security policies and training employees to implement security policies. MTG employees are required to maintain the confidentiality of services data. Employees' obligations include written confidentiality agreements and compliance with company policies concerning protection of confidential information.

MTG promptly evaluates and responds to incidents that create suspicions of unauthorized handling of services data. MTG's IST and Executive Team are informed of such incidents and, depending on the nature of the activity, defines escalation paths and response teams to address the incidents. If MTG determines that your services data has been misappropriated (including by an MTG employee), MTG will promptly report such misappropriation to you in accordance with our incident response policies.


If you believe your services data has been used in a way that is not consistent with this policy, or if you have further questions related to this policy, please email at