Veralytic Logo

Privacy & Security Policy

Protecting your privacy is very important to us. We value your trust. We want you to understand what information we collect, how we protect it and how we may use it. We treat Nonpublic Personal Information (“NPI”) with respect and in accordance with this Privacy Policy.

    We do not sell information about you.
    We do not share your information for marketing purposes.

 

Information We May Collect

We may obtain NPI to provide you with the services you have requested. We may collect NPI from you, from your transactions with us, and from outside parties. This NPI may include:

  •     Your name, address, phone number, e-mail address, and
  •     Your transactions and experiences with us

Information We May Disclose

We may disclose NPI only in certain instances. The service providers and others to whom we disclose NPI are obliged to use it only for the purposes stated.

Privacy Policy Notifications

You may view our Privacy Policy at the start of the relationship via the Veralytic website. If you are no longer a consumer, we will follow our then current Privacy Policy at the date of termination.

Change in Privacy Policy

We reserve the right to change our Privacy Policy at any time. If we make material changes, we will update current consumer with a revised notice describing our new policy via the website.

Our Security Procedures

We maintain physical, electronic and procedural protections designed to protect and prevent unauthorized access to NPI. Employees who violate our Privacy Policy are subject to disciplinary action.
 

Online Privacy

In addition to the Privacy Policy outlined above, the following privacy principles apply when you visit us on our web site or communicate with us electronically.

Online information and collection

You can visit our web site without telling us who you are and without revealing anything about yourself, including your e-mail address. However, web servers collect the name of the domain you used to access the Internet, such as aol.com. We may also collect the web site you came from and visit next.

We may measure the number of visits, average time spent and other data about visitors to our web site. We may use this data to monitor site performance and to make the site easier and more convenient to use. We may use this data in the course of delivering an advertisement to you. We may also summarize data about our customers, sales, traffic patterns and services. These statistics may be provided to third parties.

Cookies

Cookies are small pieces of data stored on your computer. We use cookies to measure web site usage and enhance it. We may use cookies to remember your user name so you do not have to re-enter it each time you visit our web site. With the help of cookies, we may provide you with customized offerings that may be of interest to you. You can set your computer’s Internet browser to notify you when your computer receives a cookie. You can also prevent your computer from receiving cookies. If you set your browser to not accept cookies, you will limit the functionality we can provide you when you visit our web site.

Links to other Web Sites

We are not responsible for the information collected by other web sites if you link to them from our web site. We cannot guarantee how those sites use cookies or whether they place cookies on your computer that may identify you. You should carefully review the privacy policies of each web site you visit to understand how it collects and uses information.

E-mail Communications

We may send you e-mail communications that may be useful to you, including information about our products and services or pertinent industry news. You will be given the option to not receive such e-mail messages.

Encryption

We use encryption and authentication tools to protect information we gather on our web site. However, e-mail communications from other web sites may not be protected. If you are sending us confidential information, you may want to send it by regular mail.

Visitors and Registered Users

As a visitor to our web site, you may have access to certain features without telling us who you are or revealing any information about yourself. We will not gather any information about you when you are using these features. We may require you to become a registered user in order to gain access to and use other features. Once you become a registered user, we may collect personal information when you use our web site.

Security

Security is one of the pillars upon which Veralytic was built, and we are proud of the system we have implemented to protect the security and integrity of your data throughout every component of the Veralytic Research Platform.

Your data is secured through a combination of technology, system design and architecture and strict policies and procedures. The below material explains some of the measures used to protect your data.

Firewalls – All Veralytic equipment and applications are secured behind firewalls. Firewalls are security devices that create a barrier between the wide-open Internet and the equipment and applications used by Veralytic. Firewalls limit ways that can inflict harm on data, equipment or applications. All traffic detected to and from Veralytic’s system must pass through these firewalls, including access from the Veralytic intranet. The firewalls are also used to separate databases containing your data from Veralytic's web and application servers.

Password Protection and Data Security - Every user's password and account data are stored and transmitted in an encrypted format at all times across multiple, distributed database systems, all securely housed at a state of the art third party hosting service that provides enhanced physical security, fire protection and electronic shielding. No one but the user has access to such user’s password.

Audits and Inspections - The Veralytic security infrastructure is regularly audited and inspected to ensure the security tools utilized are up to date.

Physical Security - Veralytic provides its service from a secure environment operated by a third-party hosting service. Security personnel monitor the system 24 hours a day. Access to servers requires multiple levels of authentication. Veralytic restricts physical access to its equipment to a very select group of authorized personnel only.

SSL - All information is transmitted through Secure Socket Layer (SSL), which creates an encrypted connection between a user's browser and the Veralytic web servers. This prevents information from being stolen while it is being transmitted over the Internet.


This Privacy and Security Policy replaces all previous notices and statements.

©Veralytic


Revised September 2011