geektechnologies.us (“Geek Technologies”)
Information Collection and Use
Geek Technologies primary goals in collecting information are to provide and improve our Site, services, features and content, to administer your accounts (together, the “Service”), to enable users to enjoy and easily navigate the Site.
Personally Identifiable Information
- When you register with us through the Site to become a customer (“Customer”), we will ask you for personally identifiable information. This refers to information about you that when on its own or in combination with other identifiers can be used to contact or identify you (“Personal Information”). Personal Information includes, but is not limited to, your name, phone number(s), credit card or other billing information, email address, home and business postal addresses and Session Information (defined below). We use your Personal Information to provide the Service, and administer your inquiries.
- When a Customer and a technical support service provider who is accessible though the Site (“Expert”) share a support session, we (or a third party services provider on our behalf) may keep a record of information exchanged (including voice and other communications during desktop sharing sessions), telephone calls and the related billing information (“Session Information”).
- We also collect the other information that you provide as part of registration and which is related to the administration of the Service (e.g., without limitation zip code and individual preferences) (“Non-Identifying Information”). We use your Personal Information (in some cases, in conjunction with your Non-Identifying Information) to provide the Service, complete your transactions and administer your inquiries.
- We may combine your Personal Information with Non-Identifying Information and aggregate it anonymously with information collected from other Site Users (defined below) to attempt to provide you with a better experience, to improve the quality and value of the Service and to analyze and understand how our Site and Service are used. We may also use the combined information without aggregating it to serve you specifically, for instance to deliver a Service to you according to your preferences or restrictions.
- We may also use your Personal Information to contact you with Service newsletters, marketing or promotional materials and other information that may be of interest to you. If you decide at any time that you no longer wish to receive such communications from us, please follow the unsubscribe instructions provided in any of the communications or update your “user preferences” information. (See “Changing or Deleting Information,” below.)
- All of your Personal Information including but not limited to , credit card or other billing information are only stored on PCI Compliant Servers for utmost security
When you visit the Site, whether as a Customer or a websurfer just browsing (any of these, a “Site User”), our servers automatically record information that your browser sends whenever you visit a website (“Log Data”). This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser type or the website from which you are visiting, pages of our Site that you visit, the time spent on those pages, information you search for, access times and dates, and other statistics. We use this information to monitor and analyze use of the Site and the Service and for the Site’s technical administration, to increase our Site’s functionality and user-friendliness and to better tailor it to our visitors’ needs. For example, some of this information is collected so that when you visit the Site again, it will recognize you and may serve advertisements and other information appropriate to your interests.
Identity theft and the practice currently known as “phishing” are of great concern to Geek Technologies. Safeguarding information to help protect you from identity theft is a top priority. We do not and will not, at any time, request your credit card information, your account ID, login password, or national identification numbers in a non-secure or unsolicited e-mail or telephone communication. For more information about phishing, visit the Federal Trade Commission’s website.
Information Sharing and Disclosure
Your Sharing of your Personal Information.
There are various ways Site Users can make their Personal Information publicly available through the Site or ways in which they can supply such information to Geek Technologies. Proving your Personal Information and any other data through the Site or to Geek Technologies is voluntary and should correlate with the degree of interaction you want to have with other Site Users and Geek Technologies. Customers - When you as a Customer receive services through the Site, depending on the services you request, the Expert may have access to your Personal Information and Non-Identifying Information and in some cases your computer and whatever data is stored on your computer. For example, if you choose to receive technical support via a desktop sharing session you will be giving the Expert access to your computer over a network in addition to access to whatever documents, files and/or applications are accessible through your computer. You may also provide other diagnostic information to partake of services. Experts will only see your profile during a support session. Changing or Deleting Your Information
All Customers may review, update, correct or delete the Personal Information in their account profile by contacting us. If you would like us to delete your record in our system, please contact us and we will attempt to accommodate your request if we do not have any legal obligation to retain the record. See below for privacy contact information.
Geek Technologies is very concerned with safeguarding your information. We employ administrative, physical and electronic measures designed to protect your information from unauthorized access. We will make any legally required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored “personal data” (as defined in applicable state statutes on security breach notification) to you via email or conspicuous posting on this Site in the most expedient time possible and without unreasonable delay, insofar as consistent with
(i) the legitimate needs of law enforcement or
(ii) any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.