Invise Solutions Privacy Policy

Last Updated 9-25-2023

Introduction

At Invise Solutions (“IS”), we care about your privacy, and we’re committed to protecting it. We strive to keep your personal information safe. The purpose of this Privacy Policy is to outline the steps IS takes to keep your personal information confidential, to inform you about how and why we collect personal information, and to provide you with our contact information in case you have any questions or concerns arising out of our Privacy Policy.

Transparency

IS believes in transparency–you should be able to trust that your information and data you provide with us is kept secure and safe at all times. In order to prevent unauthorized access of your computer equipment and data, IS has physical, electronic, and managerial procedures in place; including electronic surveillance to protect your machines, and 2-tier lock systems.

When Your Information is Collected

IS provides a variety of IT related services, we’re one of the most trusted names in Utah. Your name, email, phone number, address, and internal client documentation notes are collected during your use of our services, or when purchasing products from us. This information is shared between employees at IS in a safe and secure manner.

How We Use Your Information

IS uses your information for:

  • Keeping track of any work we do for you, including services, repairs and work orders, both past and present.
  • Internal client documentation, record keeping, accounting, auditing, and customer service evaluation.
  • Improving our products and services.
  • Sending computer tips and promotional material about our products and services, to your email address.

Protecting your privacy and maintaining the integrity of personal information means that:

  1. We will keep your information and the business you do with us in confidence.
  2. We will not sell, rent, or loan your information to third parties.
  3. We will respect your privacy when we contact you concerning our various products and services.
  4. You will have control over your information we use, including, how we obtain, use, and give out this information.

Retention & Destruction of Your Data:

During repairs, we may backup your data to ensure that you do not loose your important files, documents, and/or pictures. Your personal files and data are NEVER used without your strict consent. During reload of your Operating System on your computer, we may test that a couple of your files open, to ensure that your data was not corrupted during the transfer process. The testing procedures that our technicians use are closely evaluated. We may keep your data for 30-60 days, which gives our clients time to ensure that their data is all there, and at any time you may request us to dispose of your data. At the end of this period your data is permanently destroyed from our systems, and any of your physical hard drives we have, are securely wiped and then physically destroyed.

Media

We may record, document, and take pictures while performing any work or services. This data is retained for media reasons and client documentation.

Non-Disclosure Agreement

All of our employees, interns, business partners, and contractors of Invise Solutions are required to sign a non-disclosure agreement (NDA) with us before employment. Any information our customers and clients share with us, including personally identifiable information, project details, company trade secrets, business plans, or other sensitive learned information, will not be shared outside of Invise Solutions and it’s partners without your direct consent. Your intellectual property will not be used for any other propose other than what is necessary to complete our job as IT providers. Furthermore, our employees understand that disclosing private customer information or data may result in criminal charges. Invise Solutions strictly follows HIPPA and PCI Compliance regulations.

How long we retain your data

Documentation data collected while doing business with you, may be kept indefinitely for administrative, legal, and security purposes. You cannot opt-out of this documentation; due to Know Your Customer (KYC) laws, we are legally required to document the IT and computer services we perform and the circumstances under which these services were offered. Under certain situations, we may be legally required to release your data, and the documentation we have collected during while performing our services. This process is described in the section below.

Law enforcement disclosure

If subpoenaed by law enforcement, we will provide a redacted copy of our documentation, only so much as to satisfy the specific requests under which the subpoena falls under. No additional information or records are provided without clear court orders. When this happens, it is our policy to notify the clients whose data we were legally required to release data to law enforcement. Prior to releasing your data under legal requests, we notify the concerning court or law enforcement agency about our policy disclosure. This may or may not deter them from seeking to obtain your data.

Media

We may record, document, and take pictures while performing any work or services. This data is retained for media reasons and client documentation.

What rights you have over your data

If you have an personal account with us, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. If you have an business account with us, you can request to receive an exported file of the business data we hold about you, including any data you have provided to us, passwords, server, and network information. You can also request that we erase certain personal data we hold about you. Examples of data we can erase at your request include, passwords, login information, information about employees, pin codes, gate codes, etc. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

IS may securely send your data to our servers, our client documentation software, CRM software, and our remote support dashboard. Several systems are put in place to ensure the security of your information.

HIPAA Compliance Statement

We are committed to protecting the privacy and security of your personal health information (PHI) in accordance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations. As a business associate of covered entities that handle PHI, we are required to comply with HIPAA standards and to enter into a business associate agreement (BAA) with our clients. A BAA is a contract that establishes the responsibilities and obligations of both parties regarding the use and disclosure of PHI.We have implemented administrative, technical, and physical safeguards to prevent unauthorized access, use, or disclosure of PHI that we receive, create, maintain, or transmit on behalf of our clients. We limit the access to PHI to the minimum necessary to perform our services and we train our staff on HIPAA policies and procedures. We also monitor and audit our systems and practices to ensure compliance and to identify and correct any potential risks or breaches.We respect your rights to access, amend, and request an accounting of disclosures of your PHI. We will respond to any requests or complaints that you may have regarding your PHI in a timely and professional manner. We will also notify you and our clients of any breach of your PHI that may affect your privacy or security.We value your trust and confidence in our services and we strive to maintain the highest standards of HIPAA compliance. If you have any questions or concerns about our privacy and security practices, please contact us at email address or phone number.

Cookies

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

Use of Google’s Website Analytics

This website uses Google Analytics, a web analytics service provided by Google, Inc. (“Google”). Google Analytics uses “cookies”, which are text files saved on your computer, to help the website analyze how you use the site. The information generated by the cookie about your use of the website will be transmitted to and stored by Google on servers in the United States.

This website anonymizes IP addresses, your IP address will be truncated by Google within a EU member state or other EEA state before being transmitted to the US. Only in exceptional situations will your full IP address be transmitted to Google servers in the United States and truncated there. Google will use this information for the purpose of evaluating your use of the website, compiling reports on website activity for website operators and providing other services relating to website activity and internet usage. Google will not associate your IP address with any other data held by Google.

You may refuse the use of cookies by selecting the appropriate settings on your browser, however please note that if you do this you may not be able to use the full functionality of this website. By using this website, you consent to the processing of data about you by Google in the manner and for the purposes set out above. You can also prevent Google from collecting information (including your IP address) via cookies and processing this information by downloading this browser plugin and installing it: http://tools.google.com/dlpage/gaoptout

Further information concerning the terms and conditions of use and data privacy can be found at the Google Analytics Terms of Service or at the Google Analytics Privacy Overview. Please note that on this website, Google Analytics is supplemented by “gat._anonymizeIp();” to ensure anonymized collection of IP addresses (IP masking).