preview

A Privacy Policy With Explanations

Better Essays

A Privacy Policy with Explanations
Vail Trappings is a retail fabric store in Edwards, Colorado providing custom upholstery, draperies and blinds to the mountain community surrounding the Vail and Beaver Creek ski resorts. The website at www.VailTrappingsco.com educates visitors about their services and collects contact information for scheduling free estimates. A privacy policy on the Vail Trappings website serves three purposes: building trust with visitors, complying with applicable laws and minimizing liability. It is an opportunity to tell visitors about what information Vail Trappings gathers from them and when, how they protected it, what cookies are used for, third party considerations, what laws apply to online privacy, and how …show more content…

Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
When requesting more information or requesting a free estimate we ask you to enter your name, email address, mailing address, and phone number.
We may use the information we collect from you for customer satisfaction surveys or marketing communications.
Explanation
Vail Trappings wants to earn your trust by being transparent about collecting PII. This is why we explain what PII is and specify the information we collect. Our goal is to build a relationship with you, so please expect future communications from us. Your initial website visit is only the first step and Vail Trappings appreciates the privilege of contacting you again.
Section 2: Security
• Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential.
• Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
• We use regular Malware scanning.
• We implement a variety of security measures when a user enters, submits, or accesses their information to

Get Access