Last Updated: December 28, 2012
2. Information We Collect
We collect Personal Information from you when you provide it to us when registering online, in forms and documents. For example, we may collect your name, phone number, credit card or other billing information, email address, business postal addresses and information regarding transactions you conduct using our Services.
4. How We Use the Information We Collect
We use your Personal Information and automatically collected information (including information from cookies, tags, and web beacons) for the following purposes: (i) to deliver the Services you request, (ii) to improve our Website and Services, (iii) to monitor and analyze use of our Website and our Services, (iii) to administer our Website, (iv) to verify that visitors to our web site meet the criteria required to process their requests. We reserve the right to compile and share aggregated information about our users, transactions completed using our Service, sales, and traffic, though we will not share this information in a manner that permits the identification of a specific user.
5. Protection of Your Personal Information
We take reasonable steps to maintain the safety of your Personal Information. For example, sensitive Personal Information is transmitted via Secure Socket Layer (SSL) technology and access to your account information requires a username and password.
All supplied sensitive Personal Information, including credit card information, is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our payment gateway service provider’s database to be accessed only by those authorized with special access rights to such systems and who are required to keep the information confidential. After a transaction, your credit card information will not be stored on our servers. A payment gateway service is a third-party e-commerce application service provider that authorizes payments such as credit or debit card payments for e-businesses and/or brick-and-mortar businesses.
Though no service is impenetrable, our service is built on top of Amazon Web Services (AWS). Amazon provides numerous security reports, certifications, and Independent attestations, including maintaining SAS70 Type II compliance for the AWS infrastructure, and has years of experience managing and securing large-scale data centers. More details about AWS security are available at "http://aws.amazon.com/security/".
6. Disclosure to Third Parties
7. Reviewing or Changing Personal Information
You can request changes to your Personal Information by logging into your account at www.cloudessa.com or by contacting us at email@example.com.
We will typically send you messages that relate to transactions you conduct on our Website or that have important alerts and notices about your account or our Services. You cannot opt out of these communications. Additionally, we may send you other communications such as (i) notices about your use of our Services, including notices regarding violations of our terms of service, (ii) updates to our Website and Services and (iii) promotional information regarding our Services. You can opt out of receiving promotional emails by following the opt-out instructions provided in those emails or by contacting us at firstname.lastname@example.org with your specific request.
9. Terms and Conditions
Please also visit our Terms and Conditions section establishing the use, disclaimers, and limitations of liability governing the use of our Website at www.cloudessa.com/terms-of-service/.