Privacy Statement
At Axiom Technologies we are committed to protect your privacy. We use the information we collect about you to provide the best Managed IT Services with all managed task.
What information do we collect? How do we use it?
– When you ask for any services, we need to know your name, e-mail address, and phone no. This allows us to process and fulfill your service and notify you of your service status.
– We also monitor customer traffic patterns and site usage to help us develop our site as per user requirements.
– We may also use the information we collect to occasionally notify you about important functionality changes to the Web site, new services, and special offers we think you will find valuable.
How does Axiom Technologies protect customer information?
When you ask for any services or access to your account information, we offer the use of a secure server. The secure server software (SSL) encrypts all information you input before it is sent to us. Furthermore, all of the customer data we collect is protected against unauthorized access.
What about Cookies?
Cookies are small pieces of information that are stored by your browser on your computer hard drive. Our cookies do not contain any personally identifying information, but they do enable us to provide features such as automatic member recognition allowing you to seek the best services we provide. Most Web browsers automatically accept cookies, but you can usually change your browser to prevent that. Even without a cookie, you can still use most of the features where you can enable the required services.
In Summary
We are committed to protecting your privacy. Collected information is to provide you with the best managed IT services at Axiom Technologies and to enhance your overall IT experience.
Your Consent
By using our Services, you consent to the collection and use of this information by [merchant]. If we decide to change our privacy policy, we will post those changes on this page so that you are always aware of what information we collect, how we use it, and under what circumstances we disclose it.