This policy covers all users who register to use this website (“Strongvox”). It is not necessary to register in order to gain access to the searching facilities of the site, but we may restrict access to certain areas.
During our registration process, we ask for personal information that both identifies you and enables us to communicate with you. We will use the information you provide only for the following purposes:
To send you newsletters and details of offers and promotions in which we believe you will be interested
To improve the content, design and layout of the website and to facilitate knowledge management
To understand the interests and buying behaviour of our registered users
To perform other such general marketing and promotional activities focused on our products and services
This site contains links to other sites. Strongvox is not responsible for the privacy practices or the content of such web sites.
2. Consent and Choice
If you choose not to register or not provide personal information, you may still visit the Strongvox website but you will not be able to access the restricted areas available to registered users. By completing the registration process, you accept the Terms and Conditions described and consent to our using your information accordingly.
You can review your personal information at any time to ensure it is correct and current. You will be able to update, correct, change or delete inaccurate details.
The Strongvox website is not intended for children and we ask that no one under the age of 18 submits personal information to us or uses the site without supervision of a parent or guardian.
We have taken appropriate measures to ensure that your personal information is not unlawfully processed. Strongvox uses industry standard practices to safeguard the confidentiality of your personal identifiable information, including “firewalls” and Secure Socket Layers. However, no information transferred over the Internet or wireless network can be guaranteed to be completely secure. We employ many different security techniques to protect such data from unauthorised access by users inside and outside the company.
6. Changes to this policy