PRIVACY POLICY

Welcome to EPM Solutions

At EPM Solutions, we understand that privacy is an important issue for our customers. It is our policy to respect the privacy of all accounts that we maintain and to protect the security and confidentiality of nonpublic personal information relating to those accounts. This policy applies to all our former as well as current customers.

As part of the normal operation of our services we collect and, in some cases, disclose information about you. This Privacy Policy describes the information we collect about you and what may happen to that information. Although this policy may seem long, we have prepared a detailed policy because we believe you should know as much as possible about our practices so that you can make informed decisions. The privacy practices of this statement apply to the business administration of our www.epmsolutions.com and www.mspshosting.com website.

This Privacy Policy is incorporated into and subject to the terms of the Service Agreement.

1. Information We Collect.

Our primary goal in collecting personal information is to provide you with an efficient service.

We use your financial information, including credit card information to verify your name, address, and other information, as well as to bill you for your use of our services.

We use data collection devices such as “cookies” on certain pages of our site. “Cookies” are small files placed on your hard drive that assist us in rewarding any affiliate who may have referred you and to apply any promotional discount code you may have entered. Our cookies are “persistent cookies,” meaning that they remain on your hard disk so that the affiliate is credited and the promotion code is applied if you later sign up for service. You are always free to decline our cookies if your browser permits.

If you order hosting with us, we will collect information; which may include a billing address, a credit card number and a credit card expiration date. We may also collect tracking information from checks or money orders.

If you send us personal correspondence, such as emails or letters, or if other users or third parties send us correspondence about your activities or postings on your site, we may collect such information into a file specific to you.

2. Our Use of Your Information.

We use information in the file we maintain about you to resolve disputes, troubleshoot problems and enforce our Service Agreement.

If you choose to order hosting, or other services, we use your address and billing information to bill you and provide associated support.

3. Control of Your Password.

You are responsible for all actions taken with your login and password, including fees. Therefore we do not recommend that you disclose your login and password to any third parties. If you choose to share your login and password or your information with third parties, you are responsible for all actions taken with your login and password. If you lose control of your password, you may lose substantial control over your personally identifiable information. Therefore, if your password has been compromised for any reason, you should immediately change your password.

4. Changing Your Personally Identifiable Information.

Following registration, you can change the information you submitted during registration. You must promptly update your information if it changes.

5. Account Deactivation

Upon your request we will deactivate your account, contact information, and financial information from our active databases. Such information will be deactivated as soon as reasonably possible in accordance with our deactivation policy and applicable law.

6. Security.

EPM Solutions treats data as an asset that must be protected against loss and unauthorized access.

EPM Solutions strives to insure that our systems are secure and that they meet the highest industry standards. We protect corporate and personal information that is provided to us by you by maintaining physical, electronic and procedural safeguards that either meet or exceed applicable law. Where appropriate, we employ firewalls, encryption technology, user authentication systems (i.e. passwords and personal identification numbers) and access control mechanisms to control access to systems and data. Third parties who may have access to such personal information must also agree to follow appropriate standards of security and confidentiality.