Personal Information and Choice
You may choose whether to provide personal information on-line. “Personal information” is information about a natural person that is readily identifiable to that specific individual. Personal information includes such things as an individual’s name, address, and phone number. A domain name or Internet protocol address is not considered personal information. We collect no personal information about you unless you voluntarily provide it to us by sending us email, participating in a survey or completing an on-line form. You may choose not to contact us by email, participate in a survey, or provide any personal information using an online form. Your choice to not participate in these activities will not impair your ability to browse the repelsharks.com web site and read or download any information provided on the site.
If You Send Us Personal Information
If you choose to provide us with personal information — as in an e-mail to our help mailbox, or by filling out a form with your personal information and submitting it to us through our web site — we use that information to respond to your message and to help us get you the information you have requested. We do not create individual profiles with the information you provide or to give it to any private organizations. Repelsharks.com does not collect information for commercial marketing.
Email is not a secure medium. Personal information sent via the Internet can be intercepted. You may, therefore, wish to reconsider the advisability of sending messages that contain sensitive, personal information to this Intranet address. If you believe that your personal information is being used for a purpose other than what was intended when submitted, you may contact Dinesh Patel at email@example.com regarding this matter.
Repelsharks.com, as developer and manager of this web site, has taken several steps to safeguard the integrity of its data and prevent unauthorized access to information maintained. These measures are designed and intended to prevent corruption of data, block unknown or unauthorized access to our systems and information, and to provide reasonable protection of private information in our possession.