Your privacy is important to us. This privacy statement explains the personal data Computech processes, how our company processes it, and for what purposes.
Personal Data We Collect
Computech collects data from you, through our interactions with you and through our services. You provide some of this data directly, and we get some of it by collecting data about your interactions, use and experiences with our services. The data we collect depends on the context of your interactions with Computech and the choices you make, including your privacy settings and the services and features you use. We also obtain data about you from third parties.
You have choices when it comes to the technology you use and the data you share. When we ask you to provide personal data, you can decline. Many of our services require some personal data to provide you with a service. If you choose not to provide data necessary to provide you with a service or feature, you cannot use that service or feature. Likewise, where we need to collect personal data by law or to enter into or carry out a contract with you, and you do not provide the data, we will not be able to enter into the contract; or if this relates to an existing service you’re using, we may have to suspend or cancel it. We will notify you if this is the case at the time. Where providing the data is optional, and you choose not to share personal data, features like personalization that use such data will not work for you.
Computech uses the data we collect to provide you rich, interactive experiences. In particular, we use data to:
● Provide our services, which includes updating, securing, and troubleshooting, as well as providing support. It also includes sharing data, when it is required to provide the service or carry out the transactions you request;
● Improve and develop our services;
● Personalize our services and make recommendations; and
● Advertise and market to you, which includes sending promotional communications, targeting advertising, and presenting you relevant offers.
We also use the data to operate our business, which includes analyzing our performance, meeting our legal obligations, developing our workforce, and doing research.
In carrying out these purposes, we combine data we collect from different contexts (for example, from your use of two Computech services) or obtain from third parties to give you a more seamless, consistent, and personalized experience, to make informed business decisions, and for other legitimate purposes.
We share your personal data with your consent or to complete any transaction or provide any service you have requested or authorized. We also share data with Computech-controlled affiliates and subsidiaries; with vendors working on our behalf; when required by law or to respond to legal process; to protect our customers; to protect lives; to maintain the security of our services; and to protect Computech and its customers’ rights and property.
You can also make choices about Computech collection and use of your data. You can control your personal data that Computech has obtained, and exercise your data protection rights, by contacting Computech or using various tools we provide. How you can access or control your personal data will depend on which services you use. For example, you can:
● Choose whether you wish to receive promotional emails, SMS messages, telephone calls, and postal mail from Computech.
● Access and clear your data through our site by deleting your profile.
See our latest
5G, just like all previous generations of mobile systems, operates on the RF spectrum, which is a
Any small business wants to ensure it is operating as productively as possible and that means making
If you have an iPhone 12, there's little reason to upgrade right now. That's because the iPhone 12
Excel’s Ribbon is great for finding everything you might ever want to do in a spreadsheet, particularly
Whether you are a small business owner looking for a new workstation or planning to set up
Here are 7 security tips to keep sensitive information safe in the cloud: 1) Create complex passwords