Privacy Policy
1. Introduction
Effective Date: Sep 17, 2023
Welcome to Vektor TMS. This Privacy Policy is designed to inform you about our practices concerning the collection, use, and sharing of your personal information. By using Vektor TMS, you accept and consent to the practices described in this Privacy Policy.
Purpose and Scope of the Privacy Policy
This Privacy Policy applies to your use of all products, services, and websites offered by Vektor TMS and its affiliates (collectively, "Vektor TMS" or "we"), excluding any products, services, or websites with their own Privacy Policy. It is intended to provide transparency about our data practices and the choices available to you.
Overview of Vektor TMS's Commitment to User Privacy
At Vektor TMS, we deeply respect your right to privacy. Your trust is our most important asset, and we are committed to preserving it. We commit to being transparent, accountable, and ensuring your personal data is kept confidential and secure.
2. Definitions
Personal Information
Refers to any information relating to an identified or identifiable individual. This may include, but is not limited to, names, email addresses, postal addresses, and phone numbers. It can also encompass online identifiers such as IP addresses or device IDs.
Processing
Any operation or set of operations performed on personal data, whether or not by automated means. This includes collection, recording, organization, structuring, storage, adaptation, retrieval, consultation, use, disclosure, dissemination, or otherwise making available, alignment, combination, restriction, erasure, or destruction
Data Controller
The entity that determines the purposes and means of processing personal data. For the purpose of this Privacy Policy, Vektor TMS is the Data Controller of your personal information.
Data Processor
An entity that processes personal data on behalf of the Data Controller. Data Processors act based on the instructions of the Data Controller and implement measures to ensure the confidentiality and security of the data.
Consent
Freely given, specific, informed, and unambiguous indication of an individual's wishes by which they, through a statement or clear affirmative action, signify agreement to the processing of personal data relating to them.
By using Vektor TMS and agreeing to this Privacy Policy, you hereby consent to the collection and use of your personal information as described herein. Should you wish to revoke your consent, you may do so in accordance with the provisions set out in our Terms and Conditions.
3. Information Collection
Types of Information Collected
Personal Information: This includes data that can be used to identify you directly or indirectly. Examples include your name, email address, phone number, postal address, and other identifiable details.
Demographic Information: Data related to your age, gender, location, occupation, education level, and other demographic factors.
Behavioral Information: This encompasses data about how you interact with Vektor TMS, such as your browsing patterns, preferences, feedback, and other behavioral traits.
Technical Information: Data generated from your devices and interactions with our platform. This includes IP addresses, browser types, device IDs, cookies, and other tracking technologies.
Methods of Collection
Direct Input: Information you provide to us directly, such as when you create an account, fill out forms, make a purchase, or communicate with our customer support.
Automated Tracking: As you navigate through Vektor TMS, certain information may be passively collected using various technologies and means, such as Internet Protocol addresses, cookies, Internet tags, and navigational data collection.
Third-party Sources: We may receive information about you from third-party sources, such as partners, advertisers, and integrated services, which we may combine with other information we have about you.
Purpose of Collection
Service Delivery: To provide, maintain, and improve the Vektor TMS platform, ensuring you receive a personalized and seamless experience.
Communication: To communicate with you about updates, promotions, offers, and other news related to Vektor TMS.
Security: To protect the security and integrity of our platform, as well as to protect the rights, property, or safety of Vektor TMS, our users, or any other person.
Research & Development: To understand user behavior and preferences, which aids in the development of new features, products, and services.
Legal Obligations: To comply with legal obligations, resolve disputes, and enforce our agreements, including our Terms and Conditions.
Marketing and Advertising: To provide you with tailored advertising and marketing campaigns, both on Vektor TMS and on third-party platforms.
By providing your information to Vektor TMS, you consent to the collection, use, and sharing of your information as described in this section and elsewhere in this Privacy Policy. If you do not agree with our data practices, please refrain from using our platform.
4. Use of Collected Information
How Vektor TMS Uses the Information
Service Provisioning: We use your information to register, manage, and maintain your account, provide you with access to particular tools and services, respond to your inquiries, and manage your preferences.
Enhancement of User Experience: By understanding how you use Vektor TMS, we can tailor content, improve navigation, and optimize performance, ensuring a seamless and personalized experience.
Security Measures: Your information aids in maintaining the security of the platform, investigating or preventing potential fraudulent activities, and ensuring the consistent and safe operation of our services.
Communication: We use your contact details to communicate with you, send you updates, answer queries, and provide customer support.
Marketing and Promotions: Based on your preferences and behavior, we may send you promotional messages, advertisements, and other marketing-related information.
Research & Analysis: We analyze user data to understand trends, customer preferences, and demographic factors, helping us innovate and enhance our services.
Legal & Compliance: We may process your information to comply with legal obligations, court orders, or in connection with any legal process.
Legal Bases for Processing
Consent: In certain instances, we process your data based on the consent you expressly grant to us at the point of collection. For example, we will only send you promotional emails if you have given explicit consent.
Contractual Necessity: We process and use certain data for the performance of our contract with you. This includes providing you with our services, ensuring our terms and conditions are upheld, and offering customer support.
Legitimate Interests: We may process your data when it's necessary for our legitimate interests, as long as this processing doesn't outweigh your rights. For instance, we analyze user behavior to improve our services and ensure the security of our platform.
Legal Obligation: In cases where we are legally required to collect specific data or need the data to protect your interests or those of another person, we may process your information.
It's essential to understand that while we prioritize obtaining your explicit consent, there are instances where we rely on other legal bases to process your data. We always strive to ensure that our processing is lawful, fair, and transparent. If you have any concerns or questions about our data processing practices, please reach out to us.
5. Cookies and Tracking Technologies
Purpose and Types of Cookies Used
Essential Cookies: These are strictly necessary for the operation of Vektor TMS. They enable you to navigate around the site, use its features, and access secure areas. Without these cookies, services like shopping baskets or e-billing cannot be provided.
Performance Cookies: These cookies collect information about how visitors use Vektor TMS, for instance, which pages visitors go to most often, and if they get error messages from web pages. These cookies don’t collect information that identifies a visitor. All information these cookies collect is aggregated and therefore anonymous.
Functionality Cookies: These are used to recognize users when they return to Vektor TMS. This enables us to personalize our content for you, greet you by name, and remember your preferences (for example, your choice of language or region).
Targeting or Advertising Cookies: These cookies are used to deliver adverts more relevant to you and your interests. They are also used to limit the number of times you see an advertisement as well as help measure the effectiveness of the advertising campaigns.
Analytics Cookies: These cookies help us understand how our users engage with Vektor TMS, allowing us to analyze and improve our platform continually.
Managing Cookie Settings and Preferences
You have the right to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser settings to decline cookies if you prefer. If you choose to decline cookies, you may not be able to fully experience the interactive features of Vektor TMS or other websites you visit.
To manage your cookie settings:
Browser Settings: You can set or amend your web browser controls to accept or refuse cookies. As the means by which you can refuse cookies through your web browser controls vary from browser-to-browser, you should visit your browser's help menu for more information.
Disabling Cookies: If you choose to disable cookies, some areas of Vektor TMS may not work properly or at all.
Third-Party Tools: Some third-party tools and services allow you to manage the tracking technologies they utilize. For instance, Google Analytics offers an opt-out feature.
Other Tracking Mechanisms
Pixel Tags: Also known as clear GIFs, beacons, spotlight tags, or web bugs, pixel tags are tiny, transparent graphic images placed on a webpage or in an email or other type of message. They are used to track user activities and communicate with cookies, helping us understand patterns, track user movements, and gather broad demographic information.
Web Beacons: These are small strings of code that provide a method for delivering a graphic image on a webpage or in an email message for the purpose of transferring data. Web beacons can recognize certain types of information on your computer such as cookies, the time and date a page is viewed, and a description of the page where the web beacon is placed.
It's essential to understand that these technologies are crucial for the optimal functioning of Vektor TMS and ensuring a seamless user experience. If you have concerns or require further information about our use of cookies and other tracking technologies, please contact us.
6. Data Sharing and Third-Party Involvement
Categories of Third Parties with Whom Data May Be Shared
Service Providers: We may share your information with third-party vendors, consultants, and other service providers who perform services on our behalf or help us operate Vektor TMS. This includes, but is not limited to, payment processors, hosting services, and customer support services.
Affiliates and Subsidiaries: Vektor TMS may share data with our affiliated companies for business and operational purposes.
Business Partners: We may share your information with our business partners in connection with offering you co-branded services, selling or distributing our products, or engaging in joint marketing activities.
Legal and Regulatory Bodies: We may disclose your information if required by law, regulation, or legal process, or if we believe that such action is necessary to comply with the law and the reasonable requests of law enforcement.
Potential Buyers: In the event of a merger, acquisition, reorganization, or sale of assets, your personal data may be sold or transferred as part of that transaction.
Purpose of Sharing
Operational Necessities: Sharing with service providers to ensure the smooth operation of Vektor TMS, including hosting, maintenance, and customer support.
Enhanced Services: To provide you with a comprehensive suite of services, we may integrate third-party tools and services that require data sharing.
Legal Compliance: To comply with legal obligations, court orders, or in response to a lawful request by public authorities.
Business Development: Sharing with potential partners, investors, or other stakeholders as part of business development efforts.
Third-Party Services Integrated into Vektor TMS
Payment Processors: To facilitate transactions on Vektor TMS, we may integrate third-party payment gateways.
Analytics Tools: We use third-party analytics tools like Google Analytics to understand user behavior and improve our services.
Marketing Platforms: Tools like Mailchimp or HubSpot may be integrated to manage our email campaigns and customer communications.
Customer Support Platforms: We may use platforms like Zendesk or Intercom to provide customer support and manage user queries.
Safeguards in Place for Third-Party Data Sharing
Data Processing Agreements: We enter into data processing agreements with third parties that process personal data on our behalf, ensuring they adhere to strict data protection standards.
Regular Audits: We conduct regular audits of third parties to ensure they maintain the confidentiality and security of the personal data they process on our behalf.
Limitation on Use: Third parties are restricted from using the personal data for any purpose other than to provide the services we have contracted them for.
Encryption and Security: We ensure that third parties use industry-standard encryption methods and security protocols to protect data during transmission and storage.
Transparency: We maintain transparency about our third-party involvements and provide users with options to manage and control their data sharing preferences.
Please note that while we strive to protect your personal data, no system can be 100% secure. We encourage users to be cautious and protect their personal data when interacting with any online platform, including Vektor TMS. If you have concerns or questions about our data sharing practices, please contact us.
7. Data Storage and Security
Where and How Data is Stored
Data Centers: Vektor TMS stores user data in secure data centers located in multiple regions to ensure redundancy and availability. These data centers are equipped with state-of-the-art infrastructure and adhere to global standards for security and compliance.
Cloud Storage: We leverage trusted cloud service providers, such as Amazon Web Services (AWS) and Google Cloud Platform, to store and manage certain data. These providers are known for their robust security measures and compliance certifications.
Data Retention: User data is retained for as long as it is necessary to fulfill the purposes for which it was collected, including for the purposes of satisfying any legal, accounting, or reporting requirements. After this period, personal data is either deleted or anonymized for statistical purposes.
Security Measures and Protocols in Place
Encryption: All data, both at rest and in transit, is encrypted using industry-standard encryption algorithms. This ensures that even if data is intercepted, it remains unreadable without the appropriate decryption keys.
Access Control: Strict access controls are in place to ensure that only authorized personnel can access user data. Multi-factor authentication, rigorous password policies, and regular access reviews are some of the measures we employ.
Firewalls and Intrusion Detection Systems: Our systems are protected by advanced firewalls that monitor and control incoming and outgoing network traffic. Additionally, intrusion detection systems monitor for any malicious activities or policy violations.
Regular Security Audits: We conduct regular security audits and vulnerability assessments to identify and rectify potential security loopholes.
Employee Training: All Vektor TMS employees undergo periodic security training to stay updated on best practices and ensure they handle user data responsibly.
Data Breach Notification Procedures
Immediate Action: In the event of a data breach, our priority is to contain the breach and prevent further unauthorized access. We will immediately mobilize our security team to address the issue.
Notification to Affected Users: If we determine that your personal data has been compromised, we will notify you without undue delay, providing details about the nature of the breach, the data that was accessed, and measures taken to address it.
Notification to Authorities: In compliance with data protection regulations, we will report significant breaches to the relevant data protection authority within 72 hours of becoming aware of the breach.
Remedial Measures: Post-breach, we will take steps to mitigate the impact and prevent future breaches. This may include system patches, updates, or changes to security protocols.
Transparency: We are committed to maintaining transparency about security incidents. We will provide updates and information about the breach and our response measures on our official channels.
We understand the importance of your personal data and are committed to safeguarding it. If you have any questions or concerns about our data storage and security practices, please contact us.
8. User Rights and Choices
Accessing, Correcting, and Deleting Personal Data
Right to Access: Users have the right to request access to their personal data stored by Vektor TMS. Upon request, we will provide a copy of the data we process about you in a commonly used electronic format.
Right to Rectification: If you believe that any personal data we hold about you is incorrect or incomplete, you can request that we correct or supplement such data. We encourage users to update their personal data promptly if it changes or is inaccurate.
Right to Erasure ("Right to be Forgotten"): Users can request the deletion of their personal data when it is no longer necessary for the purposes for which it was collected, or when they withdraw their consent. Certain exceptions may apply, such as when data retention is required by law.
Opting Out of Data Collection or Sharing
Data Collection: Users can choose to opt out of specific data collection practices, such as behavioral tracking. This may affect the functionality or personalization of our services.
Data Sharing: Users have the right to opt out of the sharing of their personal data with third parties for purposes other than those essential to the provision of our services.
Marketing Communications: Users can opt out of receiving marketing communications from Vektor TMS at any time by using the unsubscribe link in our emails or by contacting us directly.
Rights Under Specific Regulations
General Data Protection Regulation (GDPR): For users in the European Economic Area (EEA), the GDPR grants additional rights, including data portability, restriction of processing, and the right to lodge a complaint with a supervisory authority.
California Consumer Privacy Act (CCPA): For residents of California, the CCPA provides specific rights regarding the sale of personal data, the right to know about personal data collected, and the right to request the deletion of personal data.
Other Jurisdictions: Depending on your location, other data protection laws may grant you additional rights. We are committed to honoring these rights in accordance with applicable regulations.
To exercise any of the above rights or for more information about your data protection rights, please contact our Data Protection Officer or use the contact details provided in our "Contact Us" section. We are dedicated to responding to all requests in a timely and compliant manner.
9. International Data Transfers
Mechanisms for Transferring Data Across Borders
Standard Contractual Clauses: Vektor TMS may rely on standard contractual clauses approved by the European Commission or other relevant authorities for transferring personal data outside the European Economic Area (EEA). These clauses ensure that your data is protected to the same standard as it would be within the EEA.
Privacy Shield Framework: While the Privacy Shield Framework has been invalidated as a mechanism for data transfers from the EU to the US, Vektor TMS continues to adhere to its principles for data transferred under this framework prior to its invalidation.
Data Processing Agreements: When engaging with third-party service providers outside of the EEA, Vektor TMS ensures that Data Processing Agreements (DPAs) are in place, which include provisions to ensure the protection of transferred data.
Consent: In certain situations, we may transfer personal data outside of the EEA based on your explicit consent. In such cases, we will inform you about the potential risks of the transfer.
Compliance with International Data Protection Regulations
General Data Protection Regulation (GDPR): Vektor TMS is committed to complying with the GDPR for all data processing activities involving data subjects in the EEA. This includes ensuring that data transfers outside of the EEA are carried out in accordance with the GDPR's requirements.
Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules (CBPR): For data transfers within the APEC region, Vektor TMS adheres to the CBPR system, which ensures the protection of personal data when transferred between APEC member economies.
Other Regional Regulations: Vektor TMS recognizes the importance of various regional data protection regulations and strives to ensure compliance with all applicable laws when transferring data internationally. This includes conducting regular assessments and audits of our data transfer mechanisms.
Vektor TMS is dedicated to maintaining the highest standards of data protection during international transfers. We continuously monitor changes in international data protection laws and adjust our practices accordingly to ensure the utmost protection of your personal data, regardless of where it is processed.
10. Children's Privacy
Statement on Not Knowingly Collecting Data from Minors
Vektor TMS is committed to protecting the privacy of children. Our platform and services are designed for businesses and are not intended for or directed at individuals under the age of 18. We do not knowingly collect, use, or disclose personal information from children under the age of 18 without parental consent, unless permitted by law.
Procedures for Deleting Data Inadvertently Collected from Minors
In the event that we become aware that we have inadvertently collected personal information from a child under the age of 18 without the necessary parental consent:
Immediate Deletion: We will take prompt action to delete that information from our records.
Notification: If feasible, we will notify the child's parent or guardian about the inadvertent collection and our subsequent deletion of such information.
Review and Prevention: We will review our data collection procedures to ensure that such an incident does not recur in the future. This may include enhancing our age verification processes and implementing additional safeguards.
User Reporting: We encourage users of Vektor TMS, and the public at large, to report any instances where they believe we may have inadvertently collected data from a minor. Such reports can be directed to our Data Protection Officer or through our designated reporting channels.
Vektor TMS takes children's privacy seriously and is dedicated to implementing measures that prevent the unintentional collection of data from minors. We urge parents and guardians to monitor their children's online activities and to educate them about safe internet practices.
11. Links to Other Websites
Disclaimer about Third-Party Links
Vektor TMS may contain links to external websites, platforms, or services that are not operated or controlled by us. These links are provided for your convenience and reference only. We do not endorse, nor are we responsible for, the content, privacy policies, or practices of these third-party sites. Our Privacy Policy does not extend to external websites, even if you access them through a link on our platform.
Encouragement to Review Third-Party Privacy Policies
We strongly encourage our users to be cautious when leaving Vektor TMS and to read the privacy policies of any third-party website, platform, or service that they visit. Understanding the privacy practices of other sites can help ensure the protection of your personal information when navigating the internet.
12. Changes to the Privacy Policy
Procedures for Updating the Policy
Vektor TMS is committed to staying up-to-date with the latest legal requirements and best practices in data protection. As such, we may update this Privacy Policy from time to time to reflect changes in our practices, services, or in response to evolving legal frameworks. Any changes made to this policy will be in line with our commitment to user privacy and data protection.
Notification Mechanisms for Updates
Direct Notification: Registered users of Vektor TMS will receive an email notification informing them of significant changes to our Privacy Policy.
Platform Announcement: We will post a prominent notice on our platform, highlighting any major changes to our Privacy Policy.
Policy Version and Date: The "Effective Date" at the beginning of this Privacy Policy will be updated to reflect the date of the most recent modifications.
We encourage all users to periodically review our Privacy Policy to stay informed about our data protection practices. Your continued use of Vektor TMS after any changes to this policy will constitute your acceptance of such changes.
13. Dispute Resolution
Procedures for Addressing Complaints or Disputes Related to Privacy
At Vektor TMS, we are committed to resolving any concerns or disputes related to privacy in a timely and efficient manner. If you have any concerns about how your personal information is handled or believe there has been a breach of this Privacy Policy, please follow the steps below:
Initial Contact: Reach out to us directly at legal@vektortms.com with a detailed description of your concern or complaint. Our dedicated team will review your submission and aim to respond within 30 days.
Escalation: If you are not satisfied with our initial response, you may escalate the matter by providing additional details or clarifications. We will re-evaluate the situation and work diligently to address your concerns.
External Bodies: If, after following the above steps, you believe that your complaint has not been adequately addressed, you may have the right to lodge a complaint with a data protection authority in your jurisdiction.
Arbitration Clauses
In the event of any dispute arising out of or in relation to this Privacy Policy, both parties agree to first attempt to resolve the matter amicably through negotiation. If the dispute cannot be resolved through negotiation, both parties agree to submit the dispute to binding arbitration. The arbitration will be conducted in accordance with the rules of a recognized arbitration body, to be mutually agreed upon by both parties. The decision of the arbitrator will be final and binding on both parties.
14. Contact Information
For any questions, concerns, or data requests related to this Privacy Policy, or if you need further clarification on any aspect of our data protection practices, please contact us at:
Email: legal@vektortms.com
We are dedicated to ensuring the privacy and protection of our users' data. Your feedback and inquiries are essential to us, and we strive to address them promptly and thoroughly.
15. Limitation of Liability
While Vektor TMS employs stringent security measures and protocols to protect your personal information, no system can be guaranteed to be 100% secure. As such, we cannot ensure or warrant the security of any information you transmit to us or guarantee that your information on the Vektor TMS platform may not be accessed, disclosed, altered, or destroyed by a breach of any of our physical, technical, or managerial safeguards.
To the fullest extent permitted by applicable law, Vektor TMS shall not be liable for any indirect, incidental, special, consequential, or punitive damages, or any loss of profits or revenues, whether incurred directly or indirectly, or any loss of data, use, goodwill, or other intangible losses, resulting from (a) unauthorized access to, use of, or disclosure of your personal data; (b) errors, mistakes, or inaccuracies of data; (c) personal injury or property damage resulting from your access to or use of our service; or (d) any unauthorized access to or use of our secure servers and/or any personal information stored therein.
16. Governing Law and Jurisdiction
This Privacy Policy, and any disputes arising from or relating to the interpretation thereof, shall be governed by and construed under the laws of the jurisdiction in which Veido LLC is incorporated, without regard to its conflict of law principles.
Any legal actions, suits, or proceedings arising out of this Privacy Policy (whether for breach of contract, tortious conduct, or otherwise) will be brought exclusively in the courts of the jurisdiction in which Veido LLC is incorporated, and you hereby accept and submit to the personal jurisdiction of these courts with respect to any legal actions, suits, or proceedings arising out of this Privacy Policy.
You also waive any right to a jury trial in connection with any action or litigation in any way arising out of or related to this Privacy Policy and acknowledge that either party may seek injunctive relief in any court of competent jurisdiction, either in conjunction with or independently of any other remedy provided by law.