Learn more about what we do
Data we collect and how we protect your privacy
For purposes of this Agreement, “Site” refers to the Company’s website, which can be accessed at www.geekhousecallsnc.com
“Service” refers to the Company’s services accessed via the Site, in which users can read about our scope of service, general pricing, frequently-asked questions, et cetera.
INFORMATION WE COLLECT: We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes your email address(es), your business(es)’ physical and mailing locations, personal and/or business cellular telephone numbers, IP (Internet Protocol) addresses, software licensing information (eg: Windows licensing information), hardware serial numbers (in the event of new products provided by GEEK HOUSECALLS LLC within the scope of a technology systems installation, or when such is gathered during a technology systems audit, also referred to as an ‘IT audit’), which you submit to us through the registration process at the Site.
1. Information collected via Technology To use our website, hereafter referred to as “the Service”, you do not need to submit any Personal Information other than your email address. To use the Service thereafter, you do not need to submit further Personal Information.
However, in an effort to improve the quality of the Service, we track information provided to us by your browser or by our software application when you view or use the Service, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you.
We track this information using cookies, or small text files which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis.
For example, we store a persistent cookie to track user preferences, sign-in information (if so desired), and other user-selected settings. Persistent cookies are stored on your device and may be deleted at any time, by way of your browser’s settings menu.
2. Information you provide us by registering for an account In addition to the information provided automatically by your browser when you visit the Site, to become a subscriber to the Service you will need to create a personal profile. You can create a profile by registering with the Service and entering your email address, and creating a user name and a password.
3. Children’s Privacy The Site and the Service are not directed to anyone under the age of 13. The Site does not knowingly collect or solicit information from anyone under the age of 13, or allow anyone under the age of 13 to sign up for the Service. In the event that we learn that we have gathered personal information from anyone under the age of 13 without the consent of a parent or guardian, we will delete that information as soon as possible. If you believe we have collected such information, please contact us at [email protected]
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support, and inform users about promotional offers. We may share Personal Information with outside parties if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to meet any applicable legal process or enforceable governmental request; to enforce applicable Terms of Service, including investigation of potential violations; address fraud, security or technical concerns; or to protect against harm to the rights, property, or safety of our users or the public as required or permitted by law.
III. HOW WE PROTECT INFORMATION Pertaining to our website and other web services: We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
Pertaining to on-site, remote, and other contract, maintenance, or retainer work provided by the Company: No user data are stored unless the customer requests that it is stored. All data that are stored are protected by security best practices, including secure passwords (longer than 16 alphanumeric characters, randomly generated), software and hardware encryption, multifactor authentication, virtualization/isolation, and physical security measures including locking any customer equipment that contains user data (personally identifiable information) and/or has otherwise not been formatted or sanitized. In the event that factors outside of the Company’s control, such as a website or web service hack or data breach, compromise a customer’s personally identifiable information, the Company assumes no legal responsibility for identity theft, fraud, unauthorized financial transactions, or other issues arising from said factors. We work diligently to protect your data and will not work with software or hardware vendors whose track records for protecting user data is poor.
Pertaining specifically to RMM (remote monitoring and management): The Company uses Atera for remote monitoring and management, which provides RMM and PSA (professional services automation) products to managed service providers, help desk environments, universities, governments, and IT support departments of all other descriptions. Atera uses an established remote desktop support platform called Splashtop, which facilitates direct connections from us (Geek Housecalls) to you, the customer. Each of these remote support sessions is encrypted, as well as remote file transfer (SFTP), patch management services, command prompt/PowerShell instances, and any other connections which may transmit sensitive user data between the Company and the customer. Read more about Atera’s security practices here: https://support.atera.com/hc/en-us/articles/218941397-How-do-you-ensure-privacy-and-security-in-the-Atera-Cloud- Read more about Splashtop’s security practices here: https://www.splashtop.com/security