Privacy Policy

Manufacturers trademarks, copyright, logos are the property of their respective Manufacturers and Companies. Product Descriptions logos may be removed at the written request of the respective Registers.


Your privacy on the Internet is important to J.M. Security. As part of the operation of J.M. Security, certain pieces of information are gathered about J.M. Security members. Below are explanations regarding the types of information collected, what is done with it, and how to correct or change the information. What information is collected as part of the J.M. Security member registration process, the prospective member is asked to provide an e-mail address and interest category selections. The prospective member, at their option, may voluntarily provide additional information, including personal, geographic, and demographic information. In addition to the information provided by members, J.M. Security may also collect information about J.M. Security members from third party sources. Furthermore, J.M. Security net monitors incoming and outgoing Web site traffic data to help diagnose problems with its servers and to administer its Web site. J.M. Security also uses this data to assemble broad demographic information about its members in general. The purpose of this data collection is to ensure that J.M. Security members receive only the most relevant, targeted offers and information from J.M. Security.

J.M. Security uses “contact us” forms as a way for clients, potential clients, and members to communicate with J.M. Security. J.M. Security collects the information supplied by the sender of the “contact us” form in order to establish and maintain relationships with clients, potential clients, and members. J.M. Security also uses e-mail links located on various pages of the J.M. Security Web site to allow you to contact J.M. Security with questions or comments you may have. J.M. Security welcomes these e-mail communications and makes efforts to respond to these communications where appropriate. E-mail communications and the ideas sent to J.M. Security in these e-mail communications become the property of J.M. Security. J.M. Security uses the e-mail communications to evaluate and improve its services and Web site. J.M. Security also may save these e-mail communications for future reference or use.

In an attempt to customize the J.M. Security service and provide members with the information they may be most interested in, J.M. Security also conducts internal research on our users’ demographics, interests, and behavior based upon information members provide directly to J.M. Security and information that J.M. Security may collect from third party sources and/or through the use of “cookies” (see below). J.M. Security may combine or otherwise overlay some or all of the foregoing information to build profiles about J.M. Security members, which may be individual specific or in aggregate form. By becoming a J.M. Security member, you consent to J.M. Security employing the foregoing techniques in its continuing efforts to better serve its members by providing them with the information in which they may be most interested. J.M. Security does not use information about its members for any purposes unrelated to the services offered by J.M. Security. As discussed above, J.M. Security may, from time to time, obtain information about its members from third party sources. In addition, J.M. Security may, from time to time, assist third parties in developing, implementing, and monitoring advertising campaigns using data owned or supplied by the third party. Please be aware that this Privacy Policy does not cover the conduct or practices of these third party sources. However, J.M. Security. will treat information that it receives from third party sources according to the terms of this Privacy Policy.

The Use of Cookies

As an important and necessary part of providing customizable and personalized services to its members, J.M. Security uses cookies to store and sometimes track information about members. A cookie is a small amount of data that is sent to a member’s browser from a Web server and stored on a member’s computer hard drive. Areas of J.M. Security Web site where members are prompted to login or that are customizable require acceptance of cookies. Cookies are also used to help J.M. Security track the response to messages sent to members on behalf of marketers so that J.M. Security can monitor and report campaign results to the marketer and track response history. With respect to cookies, you have a choice. By modifying your browser preferences, you have the choice to accept all cookies, to be notified when a cookie is set, or to reject all cookies. If you choose to reject all cookies, you will be unable to use those J.M. Security services that require the use of cookies in order to participate.

In an attempt to customize the J.M. Security service and provide members with the information they may be most interested in, J.M. Security also conducts internal research on our users’ demographics, interests, and behavior based upon information members provide directly to J.M. Security and information that J.M. Security may collect from third party sources and/or through the use of “cookies” (see below). J.M. Security may combine or otherwise overlay some or all of the foregoing information to build profiles about J.M. Security members, which may be individual specific or in aggregate form. By becoming a J.M. Security member, you consent to J.M. Security employing the foregoing techniques in its continuing efforts to better serve its members by providing them with the information in which they may be most interested. J.M. Security does not use information about its members for any purposes unrelated to the services offered by J.M. Security. As discussed above, J.M. Security may, from time to time, obtain information about its members from third party sources. In addition, J.M. Security may, from time to time, assist third parties in developing, implementing, and monitoring advertising campaigns using data owned or supplied by the third party. Please be aware that this Privacy Policy does not cover the conduct or practices of these third party sources. However, J.M. Security. will treat information that it receives from third party sources according to the terms of this Privacy Policy.

The Use of Cookies

Children’s Online Privacy Protection

The safety of children is important to us. J.M. Security . Web site is a general audience site and is not directed to children under the age of 18. Similarly, J.M. Security. net’s services are not directed to nor intended for anyone under the age of 18. J.M. Security will not knowingly accept members who are under the age of 18 years nor will it knowingly collect or maintain personally identifiable information from or about anyone under the age of 18 years. Accordingly, when registering to become a J.M. Security member, the new member must certify that they are not under the age of 18. J.M. Security relies on the truthfulness of this certification when accepting new members. In the event that J.M. Security receives information that establishes that a member is under the age of 18 years, J.M. Security reserves the right, which it will exercise, to terminate that member’s membership. J.M. Security will also delete all information in its databases about that terminated member. If you believe J.M. Security has any information from or about anyone under 18, please contact us at the following e-mailJMSecurity@JMSecurity.com

Confidentiality

J.M. Security will not provide personally identifiable information of a J.M. Security member to third parties except as noted under “Limits of Confidentiality.” Personally, identifiable information means the member’s name, residence address, e-mail address, Social Security number, or other information from which the member’s identity may be reasonably ascertained. J.M. Security uses proprietary technologies to preserve the anonymity of members while matching the member’s interests with targeted information sent via e-mail.

J.M. Security will under no circumstance knowingly reveal any member’s identity to marketers. It is solely at a J.M. Security member’s discretion if he or she chooses to provide personally identifiable information to a marketer by making a purchase, requesting additional information, or communicating directly with the company or organization after visiting its Web site or otherwise.

Limits of Confidentiality

As part of its day-to-day business activities, J.M. Security must disclose certain aggregate level information about J.M. Security members to certain third parties; principally, (1) J.M. Security ‘ Network Partners, and (2) Marketers who use J.M. Security network. Below is the information and circumstances under which J.M. Security may be required to disclose information to third parties.
(1) Network Partners: When a J.M. Security member registers through the Web site of a Network Partner, J.M. Security is obligated to disclose to that particular Network Partner the information submitted by the J.M. Security member during the registration process. In addition to the foregoing information, J.M. Security may also disclose aggregate level information to the Network Partner about J.M. Security members who registered through that particular Network Partner’s site. Such aggregate information may include, for example, the number of individuals who registered through the Network Partner’s site; the turnover rate of J.M. Security members who have registered through the Network Partner’s site; with respect to any particular campaign, the response rates of the J.M. Security members who registered through the Network Partner’s site; and statistics on the interest categories selected by the J.M. Security members who have registered through the Network Partner’s site. Subject to the exceptions discussed below, J.M. Security will not knowingly disclose any personally identifiable information about a J.M. Security member to a Network Partner unless such personally identifiable information was provided during the registration process through the Network Partner’s Web site.

(2) Marketers: J.M. Security will disclose aggregate level information about J.M. Security members to marketers as reasonably necessary to explain the services that J.M. Security can offer, to report on the advertising campaigns that J.M. Security undertakes for any particular marketer, and/or to implement and explain campaign strategies. Subject to the exceptions discussed below, J.M. Security will not knowingly disclose any personally identifiable information about a J.M. Security member to a marketer. Due to the existing legal, regulatory and security environment, J.M. Security may be required, under certain circumstances, to disclose aggregate level and/or personally identifiable information about its members. J.M. Security will use its best efforts to limit such disclosure to the following: where J.M. Security believes in good faith that it is required to do so in response to a subpoena or other legal process; where reasonably required to do so in order to maintain, update or otherwise implement J.M. Security data security measures, equipment, technical operations and the like; or where reasonably necessary to identify, contact or bring legal action against persons or entities to preserve and/or enforce J.M. Security rights.

Use of Information

J.M. Security uses member information to deliver the J.M. Security services. Thus, member information is used by J.M. Security in identifying information that may be of interest to its members. A member’s e-mail address will be used by J.M. Security to contact that member about member-selected interests. J.M. Security also uses member information to monitor, interpret, analyze, and report campaign results. J.M. Security does not use member information for purposes unrelated to the services offered by J.M. Security.

Protection of Member Information

J.M. Security undertakes substantial efforts to protect the confidentiality of the identity, preferences and other information it has collected about individual members and will never knowingly allow access to this information to anyone outside J.M. Security other than to the member or as described above under the heading Limits of Confidentiality.

J.M. Security has made a substantial investment in its server, database, backup, and firewall technologies to protect the information assets of the J.M. Security , including the confidentiality of information collected about J.M. Security members. These technologies are deployed as part of a sophisticated security architecture and protocol. You should also do your part in protecting your information. Your J.M. Security user name and password are confidential and we recommend that you not divulge them to anyone. Unfortunately, neither J.M. Security network nor data transmission over the Internet can be guaranteed to be 100 percent secure. As a result, while we strive to protect member information, J.M. Security cannot ensure or warrant the security of member information. Thus, any information a member transmits to us is done so at the member’s own risk. Once we receive member information, J.M. Security undertakes substantial efforts to protect the confidentiality of this information consistent with this Policy.

Policy Changes

The foregoing policy is effective as of May 2013. J.M. Security reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of J.M. Security services following the posting of changes to these terms will mean you accept those changes. J.M. Security will take reasonable measures to notify you if there is a material change in our privacy practices with respect to use of the information you have provided to J.M. Security. J.M. Security will conspicuously post these changes in our Privacy Policy. J.M. Security also will post a message on the home page of its Web site that states that the Privacy Policy has been changed, and will provide a link to the Privacy Policy. These postings will occur on J.M. Security Web site at least 60 days prior to any material change. For more information, see our Terms and Conditions of service. If you have any questions about this privacy statement, J.M. Security practices, or feel that your privacy has been compromised.