Information we collect and how we use it
We offer a number of services that do not require you to register for an account or provide any personal information to us, such as the interactive RFID encoder/decoder applications. In order to provide our full range of services, we may collect the following types of information:
- Log information – When you access Ken Traub Consulting services, our servers automatically record information that your browser sends whenever you visit a website. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser.
- User communications – When you send email or other communications to Ken Traub Consulting, we may retain those communications in order to process your inquiries, respond to your requests and improve our services.
- Providing our services, including the display of customized content;
- Auditing, research and analysis in order to maintain, protect and improve our services;
- Ensuring the technical functioning of our network;
- Protecting the rights or property of Ken Traub Consulting or our users; and
- Developing new services.
Ken Traub Consulting processes personal information on our servers in the United States of America and in other countries. In some cases, we process personal information on a server outside your own country. We may process personal information to provide our own services.
Ken Traub Consulting only shares personal information with other companies or individuals outside of Ken Traub Consulting in the following limited circumstances:
- We have your consent. We require opt-in consent for the sharing of any sensitive personal information.
- We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Ken Traub Consulting, its users or the public as required or permitted by law.
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to Ken Traub Consulting employees, contractors and agents who need to know that information in order to operate, develop or improve our services. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.