top of page
86da6968c96d4516959e0f9cbce5252e_edited.

Privacy Policy

Thank you for choosing our services. We are committed to safeguarding your privacy. This Privacy Policy outlines how we collect, use, and protect your personal information. By using our services, you consent to the practices described herein.

 

1. Collection of Personal Information

In the course of our professional services, it may be necessary for us to collect and process certain categories of personal information from our clients. We recognize the importance of safeguarding your privacy and adhering to all relevant data protection laws and regulations. To ensure transparency and compliance, we distinguish between two categories of personal information:

​

1.1. Personal Data: Personal Data comprises the following: Full Name, Residential Address, Date of Birth, Phone Number, Email Address, Tax Identification Number (TIN) or Employer Identification Number (EIN), Login Credentials for various credit monitoring websites and related platforms, among others.

​

1.2. Sensitive Personal Data: Sensitive Personal Data, which is subject to heightened protection measures, may also be collected in specific circumstances to fulfill legitimate purposes. This category includes: Social Security Number (SSN).

 

2. Use of Information

We employ the collected information to provide comprehensive support to our clients, including but not limited to:

​

2.1. Accessing Credit Reports: We utilize the data to assist clients in gaining access to their credit reports, facilitating an in-depth understanding of their financial standing.

​

2.2. Repairing and Building Personal/Business Credit: Our services encompass leveraging this information to aid clients in the repair and enhancement of their personal and business credit profiles, thus fostering financial stability and growth.

​

2.3. Providing Guidance for Business Establishment and Funding: Additionally, we utilize this data to offer expert guidance on the establishment of businesses and securing funding opportunities, facilitating clients in achieving their entrepreneurial goals.

 

3. Sharing Information

In the diligent pursuit of our professional functions and to ensure the seamless and successful delivery of our services, there may be circumstances where it becomes imperative for us to share your information with third parties. These third parties include, but are not limited to:

​

3.1. Vendors: We may engage reputable vendors to support various aspects of our services, such as data processing, technology infrastructure, or administrative functions. These vendors are carefully selected and bound by contractual agreements to uphold the same rigorous data protection standards that we adhere to.

​

3.2. Service Providers: In certain situations, we may collaborate with specialized service providers who assist us in offering specific services or expertise, enhancing the overall quality and efficiency of our service delivery.

​

3.3. Lenders: In cases where your engagement with us involves financial transactions or credit-related services, we may need to share relevant information with lending institutions or financial organizations. Such sharing is typically limited to what is necessary for the fulfillment of your specific requirements.

​

3.4. Affiliates: Our professional network may include affiliates or partner organizations that contribute to the fulfillment of our services. In these instances, data sharing may be essential to align our efforts and resources effectively.

​

3.5. Contractors: Certain projects or tasks may require the engagement of contractors who provide specialized skills or expertise. When this occurs, we may share data as needed to ensure the successful execution of the project. These third parties may be partnered with us to help achieve your financial goals and results.

 

4. Security Measures

We place the highest priority on ensuring the utmost security and protection of your valuable information. To achieve this, we have implemented a comprehensive set of security measures, which include:

​

4.1. Access Control: Access to personal information is meticulously controlled, limiting it exclusively to authorized personnel who require access to perform their professional duties.

​

4.2. Role-Based Access Controls: Our organization operates on a role-based access control system, ensuring that our employees are only granted access to data that is essential for their specific roles and responsibilities.

​

4.3. Secure Storage: Sensitive data is securely stored within our dedicated databases, which are fortified with robust security protocols, encryption mechanisms, and multi-layered authentication processes.

​

4.4. Regular Backups: We prioritize the safeguarding of your data by conducting regular, automated backups of our databases. These backups are encrypted and stored in secure, off-site locations, assuring data availability and integrity even in unforeseen circumstances.

​

4.5. Data Minimization: As a matter of policy, we adhere to the principle of data minimization. This means that we collect and retain only the personal information that is absolutely necessary to fulfill the purposes of our professional engagement. Outdated data is periodically and systematically deleted to ensure data accuracy and relevance.

​

4.6. Vendor Management: Our commitment to data security extends to our third-party vendors, contractors, and lending partners. These entities are rigorously vetted, and our contractual agreements mandate their compliance with stringent data security standards that are consistent with our own. This ensures that your information remains protected, even when shared with external collaborators.

 

5. Legal Inquiries

For any legal inquiries, please refer to our agreements or contact our legal department.

 

6. Consent Handling

We obtain clients' consent by having them sign our service agreements, clearly outlining how their information will be used and protected.

 

7. Data Retention

At our organization, we take data retention and management seriously to ensure the utmost security and compliance. Our data retention policy is as follows:

We retain clients' data for an approximate period of 6 to 12 months after the completion of services. This retention period allows us to address any potential post-service inquiries or requirements that may arise and facilitates the maintenance of accurate records.

After the designated retention period, we securely dispose of the data in a manner that ensures the complete erasure and irretrievability of the information, thus protecting your privacy and complying with data protection regulations.

 

8. Rights of the User

We are committed to respecting and upholding your rights as a user of our services. Your privacy and control over your personal information are of paramount importance to us. As a user, you have the following rights:

​

8.1. Right to Access: You have the right to request access to your personal data that we have collected and processed. Upon such a request, we will provide you with details regarding the specific information we hold about you and the purposes for which it is used.

​

8.2. Right to Rectification: If you believe that any of the personal information we hold about you is inaccurate or incomplete, you have the right to request that we correct or update it promptly.

​

8.3. Right to Erasure: In certain circumstances, you have the right to request the deletion of your personal data from our records. This may apply when your data is no longer necessary for the purposes for which it was collected or when you withdraw your consent.

​

8.4. Right to Restrict Processing: You have the right to request that we limit the processing of your personal data under certain conditions. This may include instances where the accuracy of the data is contested, or the processing is unlawful.

​

8.5. Right to Data Portability: You have the right to receive your personal data in a structured, commonly used, and machine-readable format and to transmit that data to another data controller where technically feasible.

 

8.6. Right to Object: You have the right to object to the processing of your personal data when it is based on legitimate interests, direct marketing, or for scientific or historical research purposes.

 

8.7. Right to Withdraw Consent: If we rely on your consent for processing your personal data, you have the right to withdraw that consent at any time. Withdrawal of consent does not affect the lawfulness of processing before the withdrawal.

 

9. Data Breach Response Plan

9.1. Identification and Containment: As soon as a breach is detected, we immediately identify the affected systems and data and take steps to contain the breach to prevent further unauthorized access or data loss.

​

9.2. Notification: We notify senior management and relevant stakeholders about the breach. Depending on the severity and scope of the breach, we may also need to notify affected customers, regulatory authorities, and law enforcement agencies as required by applicable laws and regulations.

​

9.3. Investigation: We conduct a thorough investigation to determine the cause and extent of the breach. This includes identifying the vulnerabilities that were exploited and assessing the impact on affected individuals and the business.

​

9.4. Communication Plan: We develop a communication plan that outlines how and when we will notify affected customers, stakeholders, and the public about the breach. We provide clear and timely updates as new information becomes available.

​

9.5. Mitigation: We take immediate steps to mitigate the impact of the breach. This includes patching vulnerabilities, resetting compromised credentials, and implementing additional security measures to prevent future incidents.

​

9.6. Documentation: We document all actions taken in response to the breach, including communication efforts, remediation activities, and lessons learned. This documentation is valuable for internal review, regulatory compliance, and potential legal proceedings.

 

9.7. Notification of Policy Changes: We inform clients about changes to our policy through regular mail, email, or SMS text, ensuring you are kept informed of any updates. Your awareness and understanding of our policies are important to us, and we are committed to keeping you informed of any changes that may affect you.

bottom of page