concerned with how their ‘Personally identifiable information’ (PII) is being
used online. PII, as used in US privacy law and information security, is
information that can be used on its own or with other information to identify,
contact, or locate a single person, or to identify an individual in context.
collect, use, protect or otherwise handle your Personally Identifiable
Information in accordance with our website.
What personal information do we collect from the people that visit
our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked
to enter your name, email address, mailing address, phone number or other
details to help you with your experience.
When do we collect information?
We collect information from you when you subscribe to a newsletter, fill out
a form, make a purchase, or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a
purchase, sign up for our newsletter, respond to a survey or marketing
communication, surf the website, or use certain other site features in the
To quickly process your transactions.
To send periodic emails regarding your order or other products and services.
To share your information with third-party service providers, vendors,
agents, contractors or others who perform functions on our behalf.
How we share your information?
We may share your information, including Personal Information and/or
Content, with the following types of third parties:
We may share your information with third-party service providers, vendors,
agents, contractors or others who perform functions on our behalf. For example,
we may use service providers to process your orders, deliver packages or send
mail. We will obtain consent for such sharing with service providers where
We may share your information with any current or future parent company,
affiliate or subsidiary.
Other unaffiliated third parties.
As noted above, We may send you marketing offers on behalf of third parties.
We may also share your information directly with third parties, including so
they may send you marketing offers directly. The information that we share with
third parties may include, without limitation, your email address, billing
address, shipping address and order information (eg total price).
We may also share your information, including Personal Information and/or
Content, in the following contexts:
Protecting rights and interests.
We may share your information to investigate, protect or defend the rights,
safety or property of Pegas
Technology Solutions, LLC, our customers or the public; to investigate
or enforce perceived violations of our Terms and Conditions or this Policy; as
evidence in litigation in which we are involved; and for fraud protection and
credit risk reduction purposes.
Sale or acquisition of assets.
We may share your information if we become involved in a transaction
involving the sale of our assets, such as a merger or acquisition, if we are
transferred to another company, in the event of a bankruptcy, or as part of any
other business transfer. If the surviving entity in such a transaction is not Pegas Technology Solutions, LLC,
the surviving entity may use your information pursuant to its own privacy
policies, which may be different from this Policy.
We may share your information to comply with laws, regulations, legal
process (a warrant or subpoena) or guidance; and to respond to governmental
requests (informal requests from a regulator).
Aggregate or anonymous information.
We may share anonymous or aggregate information about Pegas Technology Solutions, LLC,
users to third parties. For example, we may share anonymous or aggregate
information to inform a third party’s decision on whether to place
advertisements on our Site or on other websites. These companies may use such
information about your visits to the Site and other websites to provide
advertisements on the Site and other websites.
How do we protect visitor information?
Our website is scanned on a regular basis for security holes and known
vulnerabilities in order to make your visit to our site as safe as possible.
We do not use Malware Scanning.
Your personal information is contained behind secured networks and is only
accessible by a limited number of persons who have special access rights to
such systems, and are required to keep the information confidential. In
addition, all sensitive/credit information you supply is encrypted via Secure
Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or
accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored
or processed on our servers.
Do we use ‘cookies’?
We may use applications, servers and other technology provided by
third-party companies, such as Google Analytics, to help us improve our Site,
information-gathering tools, such as web beacons or LSOs, to perform their
services. We may automatically collect information about you through the use of
common information-gathering tools, as well as new tracking technologies that
develop as technology evolves. The tools that we or our service providers may
use to track you include the following:
A cookie is a small string of text that a website can send to your browser
to help the website remember and customize your visit. For example, we use
cookies to help us to tailor our Site to you, remember your orders, keep you
logged into your account, and compile statistics about Site usage. With most
Internet browsers or other software, you can erase cookies from your computer
hard drive, block or disable cookies or receive a warning before a cookie is
stored. Please refer to your browser instructions to learn more about these
functions. If you reject cookies, functionality of the Site may be limited, and
you may not be able to take advantage of many of the Site’s features (you may
not be able to stay logged into your account).
Web beacons/clear GIFs.
Clear graphics interchange format images (“GIFs”) are tiny graphics with a
unique identifier, similar in function to cookies, which are embedded invisibly
on web pages or in emails. We or our service providers may use clear GIFs (also
known as web beacons, web bugs or pixel tags) in connection with our Site to
track the activities of visitors to our Site, help us manage content and
compile statistics about usage of our Site. We or our service providers may
also use clear GIFs in emails to our users, to help us track email response
rates, identify when our emails are viewed and track whether our emails are
We may also use local storage objects (“LSOs”) to store your Site
preferences and to personalize your visit. LSOs are different from browser
cookies because of the amount and type of data stored. Typically, you cannot
control, delete or disable the acceptance of LSOs through your web browser. For
more information on Flash LSOs, or to learn how to manage your settings for
Flash LSOs, please click here.
- We have implemented the following:
- Remarketing with Google AdSense
- Google Display Network Impression Reporting
- Demographics and Interests Reporting
We along with third-party vendors, such as Google use first-party cookies
(such as the Google Analytics cookies) and third-party cookies (such as the
DoubleClick cookie) or other third-party identifiers together to compile data
regarding user interactions with ad impressions, and other ad service functions
as they relate to our website.
Opting out: Users can set preferences for how Google advertises to you using
the Google Ad Settings page. Alternatively, you can opt out by visiting the
Network Advertising initiative opt out page or permanently using the Google
Analytics Opt Out Browser add on.
California Online Privacy Protection Act
CalOPPA is the first state law in the nation to require commercial websites
beyond California to require a person or company in the United States (and
conceivably the world) that operates websites collecting personally
identifiable information from California consumers to post a conspicuous
those individuals with whom it is being shared, and to comply with this policy.
– See more at:
According to CalOPPA we agree to the following:
we will add a link to it on our home page, or as a minimum on the first
the word ‘Privacy’, and can be easily be found on the page specified above.
Users are able to change their personal information:
- By emailing us
- By calling us
- By chatting with us or sending us a ticket
How does our site handle do not track signals?
We honor do not track signals and do not track, plant cookies, or use
advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third party behavioral tracking?
It’s also important to note that we do not allow third party behavioral
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under
13, the Children’s Online Privacy Protection Act (COPPA) puts parents in
control. The Federal Trade Commission, the nation’s consumer protection agency,
enforces the COPPA Rule, which spells out what operators of websites and online
services must do to protect children’s privacy and safety online.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law
in the United States and the concepts they include have played a significant
role in the development of data protection laws around the globe. Understanding
the Fair Information Practice Principles and how they should be implemented is
critical to comply with the various privacy laws that protect personal
In order to be in line with Fair Information Practices we will take the
following responsive action, should a data breach occur:
We will notify the users via email within 7 business days.
We also agree to the individual redress principle, which requires that
individuals have a right to pursue legally enforceable rights against data collectors
and processors who fail to adhere to the law. This principle requires not only
that individuals have enforceable rights against data users, but also that
individuals have recourse to courts or a government agency to investigate
and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email,
establishes requirements for commercial messages, gives recipients the right to
have emails stopped from being sent to them, and spells out tough penalties for
We collect your email address in order to:
Send information, respond to inquiries, and/or other requests or questions.
Process orders and to send information and updates pertaining to orders
We may also send you additional information related to your product and/or
Market to our mailing list or continue to send emails to our clients after
the original transaction has occurred
To be in accordance with CANSPAM we agree to the following:
NOT use false, or misleading subjects or email addresses
Identify the message as an advertisement in some reasonable way
Include the physical address of our business or site headquarters
Monitor third party email marketing services for compliance, if one is used.
Honor opt-out/unsubscribe requests quickly
Allow users to unsubscribe by using the link at the bottom of each email
If at any time you would like to unsubscribe from receiving future emails:
Follow the instructions at the bottom of each email and we will promptly
remove you from ALL correspondence.
using the information below:
Mail: 18 Common st suite 201, Fairfield ME 04901
Last Edited on 3/19/17