Manufacturers trademarks, copyright, logos are the property of their respective Manufacturers and Companies. Product Descriptions logos may be removed at the written request of the respective Registers.
Your privacy on the Internet is important to J.M. Security. As part of the operation of J.M. Security, certain pieces of information are gathered about J.M. Security members. Below are explanations regarding the types of information collected, what is done with it, and how to correct or change the information. What information is collected as part of the J.M. Security member registration process, the prospective member is asked to provide an e-mail address and interest category selections. The prospective member, at their option, may voluntarily provide additional information, including personal, geographic, and demographic information. In addition to the information provided by members, J.M. Security may also collect information about J.M. Security members from third party sources. Furthermore, J.M. Security net monitors incoming and outgoing Web site traffic data to help diagnose problems with its servers and to administer its Web site. J.M. Security also uses this data to assemble broad demographic information about its members in general. The purpose of this data collection is to ensure that J.M. Security members receive only the most relevant, targeted offers and information from J.M. Security.
J.M. Security uses “contact us” forms as a way for clients, potential clients, and members to communicate with J.M. Security. J.M. Security collects the information supplied by the sender of the “contact us” form in order to establish and maintain relationships with clients, potential clients, and members. J.M. Security also uses e-mail links located on various pages of the J.M. Security Web site to allow you to contact J.M. Security with questions or comments you may have. J.M. Security welcomes these e-mail communications and makes efforts to respond to these communications where appropriate. E-mail communications and the ideas sent to J.M. Security in these e-mail communications become the property of J.M. Security. J.M. Security uses the e-mail communications to evaluate and improve its services and Web site. J.M. Security also may save these e-mail communications for future reference or use.
