Ascent Portal respect your privacy. Protecting the confidentiality and security of client information has always been an integral goal of how we conduct our business. We pledge to aim to ensure that our global business practices protect your privacy.
The Sources of Information
The Information We Have About You
When you contact us, provide us with your personal information or use our electronic services, you consent to Ascent Portal processing the information, including but not limited to your name, company name, contact information, job role and preference information. This information is used by us and/or authorized third parties to support your interaction with us, to deliver our products and services and to contact you again about other services and products we offer. By submitting your personal information to Ascent Portal, you acknowledge and consent to Ascent Portal processing your personal information accordingly. This may involve the transfer of your personal information to Ascent Portal offices in countries outside your country of residence, which may not have the same privacy legislation as your country of residence. If you do not wish to receive marketing communications from Ascent Portal, please let us know by sending an email containing the name of the Ascent Portal representative you interact with (if any) to firstname.lastname@example.org.
Ascent Portal Protecting Your Privacy
Ascent Portal is committed to protecting the privacy and the confidentiality of your personal information. Access to personal information is limited to Ascent Portal personnel and those authorized third parties who may host your data on our behalf (such as our third-party CRM provider) or may assist in providing the products and services you requested. Ascent Portal maintains physical, electronic and procedural safeguards that aim to protect the information against loss, misuse, damage or modification and unauthorized access or disclosure. Some of the features of the Ascent Portal information security program are:
A dedicated group that designs, implements and provides oversight to our information security program;
The use of specialized technology such as firewalls and access control lists;
Testing of the security and operability of products and services before they are introduced to the Internet, as well as ongoing scanning for publicly known vulnerabilities in the technology;
Monitoring of our systems infrastructure to detect weaknesses and potential intrusions; and
Implementing controls to identify, authenticate and authorize access to various systems or sites.
Other Privacy Policies or Statements; Changes to Policy