Privacy Policy of Mantos I.T. Consulting, Inc.

Your privacy is important to us, and maintaining your trust and confidence is one of our highest priorities. We subscribe to the ACM Code of Ethics and Professional Conduct .  We respect your right to keep your personal and company information confidential and understand your desire to avoid unwanted solicitations. A quick summary of our privacy policy is that we do not share any information that we receive from you with any else without your express consent. If you give use an email address or phone number via our website, we’ll only use it to contact you to respond to your inquiry or to thank you for your feedback. You will not be added to any newsletter or email database unless you ask us to do so.

Our website supports a feature that allows individuals to comment on specific postings. Although we may reject some comments as being unsuitable for publication, those published represent the opinions of the author and not necessarily that of Mantos I.T. Consulting, Inc.  Any information contained in those comments, including the name and email address of the author, are not considered confidential.

Any pre-engagement discussions we may have are considered confidential and we are happy to execute non-disclosure agreements with interested parties. If we do business, we have contracts that bind us to confidentiality and which ask for yours. Any work that we do for you is yours, unless otherwise agreed. All of the case studies and examples used on our website and in our marketing material, whether made anonymous or not, are used with the permission of the original client. Your name will not appear on client list or as reference without your specific permission.

  1. Types of Information We Collect

    We collect certain personal information about you and your organization – but only when that information is provided by you or is obtained by us with your authorization. We use that information to understand your business, your objectives, and your existing information systems in order to provide you with information technology advice, strategies, solutions, and services.

    Examples of sources from which we collect information include:

    • interviews and phone calls with you,
    • letters or e-mails from you,
    • network topology, computing hardware, software, and data systems
    • financial data, business models and plans
    • specific information about or from your clients, employees, and vendors
  2. Parties to Whom We Disclose Information

    As a general rule, we do not disclose personal information about our clients or former clients to anyone without your permission. This specifically precludes the selling of any of your information such as email addresses or organizational roles and titles for marketing purposes. However, to the extent permitted by law, certain nonpublic information about you may be disclosed in the following situations:

    • To comply with a validly issued and enforceable subpoena or summons.
    • In the course of a review of our firm’s practices under the authorization of a state or national licensing board, or as necessary to properly respond to an inquiry or complaint from such a licensing board of organization.
    • In conjunction with a prospective purchase, sale, or merger of all or part of our practice, provided that we take appropriate precautions (for example, through a written confidentiality agreement) so the prospective purchaser or merger partner does not disclose information obtained in the course of the review.
    • As a part of any actual or threatened legal proceedings or alternative dispute resolution proceedings either initiated by or against us, provided we disclose only the information necessary to file, pursue, or defend against the lawsuit and take reasonable precautions to ensure that the information disclosed does not become a matter of public record.
    • To provide information to affiliates of the firm and nonaffiliated third parties who perform services or functions for us in conjunction with our services to you, but only if we have a contractual agreement with the other party which prohibits them from disclosing or using the information other than for the purposes for which it was disclosed. (Examples of such disclosures include using an outside company to assess your network security, hardware warranties, or software licensing compliance.)
  3. Confidentiality and Security of Nonpublic Personal Information

    Except as otherwise described in this notice, we restrict access to nonpublic personal information about you to employees of our firm and other parties who must use that information to provide services to you. Their right to further disclose and use the information is limited by the policies of out firm, applicable law, our contract, and nondisclosure agreements where appropriate. We also maintain physical, electronic, and procedural safeguards in compliance with applicable laws and regulations to guard your personal or confidential information from unauthorized access, alteration, or premature destruction. With respect to compliance with regulations such as Health Insurance Portability and Accountability Act (HIPAA) and Sarbannes-Oxley (SOX), we endeavor to exceed the requirements of those acts and to help our clients to do the same.

If you have any questions or concerns regarding this policy, including any violations of it, please contact us directly. We thank our clients for allowing us to serve your I.T. consulting and software development needs. We value their trust as well as their business and are committed to protecting your privacy and theirs. We hope that you view our firm as one of your most trusted advisors and we will work to continue earning your trust. Please call us if you have any questions or if we can be of further service.

Leave a Reply

Your email address will not be published. Required fields are marked *