- 1. What personally identifiable information the Company collects.
- 2. How the Company uses the information.
- 3. With whom the Company may share information.
- 4. What types of security procedures are in place to protect the loss, misuse or alteration of information under the Company control. If corporate customers or their end users have questions or concerns regarding this statement, they should contact the Company Corporate Customer Support by email at: firstname.lastname@example.org.
Information Collection and Use
The Company is the sole owner of the information collected on its web properties, including https://enterprise.efax.com, http://www.j2.com and http://www.efax.com.The Company collects information from its users at several different points on our Web sites and through the Services, both directly from users (including through interactions with Customer Service and Sales) and through the use of technologies such as cookies, log files and clear gifs.
You may provide your contact information and company information by completing our online quote form or by contacting Sales or Customer Support. This information is used to provide by email a Service quote and information about the Services and other Company services that may be of interest to you. You can opt out of receiving these emails by clicking the opt-out link included in the emails.
Test eFax Request
If you elect to use the Test eFax tool on the Site, you will automatically receive a sample fax by email. We may also send you other emails containing information about the Services, and the Company's other services and third party services that may be of interest to you. You can opt-out of receiving these emails by clicking on the opt-out link included in the emails.
In order to establish a corporate account with the Company, the customer's administrative contact ("administrator") must first complete the registration form located on the http://www.j2corporate.com web site. During registration the administrator is required to give contact information (such as name and email address), a unique identifier, and company financial information for credit checking and billing. The Company is the sole owner of the information collected on its web properties, including https://enterprise.efax.com, http://www.j2.com and http://www.efax.com. The Company collects information from its corporate customers at several different points on our Web sites.
In order to provision service telephone numbers to end users so they can begin using the Company's eFax corporate services, the administrator must provide through the eFax Corporate administrative tool the name and email address for each end user. The administrative tool is available from the Enterprise.eFax.com web site.
The Company acts as a passive conduit for the distribution and receipt of its end users' fax, voice and e-mail communications (if provided) and therefore will not monitor, edit, or disclose the contents of any end user's private communications unless the Company in good faith believes that such action is necessary to: (1) conform to the edicts of the law or comply with legal process served on the Company; (2) protect and defend the rights or property of the Company; or (3) act under exigent circumstances to protect the personal safety of its users or the public. eFax Corporate customers should also be aware (and hereby agree) that certain technical processing of and access to fax, voice and email messages (if applicable) and their content may be required to: (a) route the messages; (b) conform to connecting networks' technical requirements; (c) prevent or minimize disruptions to the Company; or (d) conform to other similar requirements.
We store information that we collect through cookies, log files and third parties to create a profile of our end users. A profile is stored information that we keep on individual users that reflects their viewing preferences. Consequently, collected information is tied to the end user's personally identifiable information to improve the content of the site for the user. This profile is used to tailor a user's visit to our Web sites. We do not share personally identifiable elements of end user profiles with third parties.
A cookie is a piece of data stored on the user's computer tied to information about the user. Usage of a cookie is in no way linked to any personally identifiable information while on our site. We use both session ID cookies and persistent cookies. For the session ID cookie, once users close the browser, the cookie simply terminates. A persistent cookie is a small text file stored on the user's hard drive for an extended period of time. Persistent cookies can be removed by following Internet browser help file directions.
By setting a cookie on our site, end users would not have to log in a password more than once, thereby saving time while on our site. If end users reject the cookie, they may still use our site. The only drawback to this is that the user will be limited in some areas of our site.
Like most Web sites, our servers use log files to analyze trends, administer the site, and track end user's movement in the aggregate. IP addresses, etc. are not linked to personally identifiable information.
Clear gifs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of Web users. The main difference between the two is that clear gifs are invisible on the page and are much smaller, about the size of the period at the end of this sentence. Clear gifs are not tied to users' personally identifiable information.
We also use clear gifs in our HTML-based emails to let us know which emails have been opened by the recipients. This allows us to gauge the effectiveness of certain communications.
Communications from eFax Corporate
We send all new end users a welcome email to provide their fax number and password details. End users will occasionally receive emails containing information about us, updates on new service features, service usage tips, and member satisfaction surveys
On occasion it is necessary to send out a service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications which are not promotional in nature, though they can deactivate their account.
We communicate with users on a regular basis to provide requested services details regarding their accounts. We reply via email or phone. Spam and Junk Faxes
The Company has a zero tolerance policy for abuse. While we cannot be responsible for external communications sent by other resources, it is our intention to use all legally available means to prevent distribution and receipt of unsolicited commercial faxes ("junk faxes") through the service, and we specifically restrict members from taking any actions which impose an unreasonable or disproportionately large load on the Company resources. We ask that any users annoyed by receipt of such junk faxes, please report such activity to Customer Support at http://www.j2corporate.com/corp/twa/page/corporateAbuseForm.
Though we make every effort to preserve user privacy, we may need to disclose personal information when required by law wherein we have a good-faith belief that such action is necessary to comply with a current judicial proceeding, a court order or legal process served on our Web site. For example, the Company may disclose personal information to law enforcement, other government officials, or third parties in response to criminal or civil subpoenas. In cases where the Company believes that disclosure of any information about a corporate customer or end user (including account information) is necessary, we reserve the right to disclose all information in our possession about such corporate customer or end user.
Third Party Intermediaries4>
We use an outside credit card processing company to bill some corporate customers. These companies do not retain, share, store or use personally identifiable information for any secondary purposes.
In the event the Company goes through a business transition, such as a merger, being acquired by another company, or selling a portion of its assets, users' personal information will, in most instances, be part of the assets transferred. Users will be notified prior to a change of ownership or control of their personal information. If as a result of the business transition, the users' personally identifiable information will be used in a manner different from that stated at the time of collection they will be given a choice not to have their information used in this different manner, as described in the notification of changes section1, below.
The Company's Web sites contain links to other sites. Please be aware that the Company is not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our sites and to read the privacy statements of each and every Web site that collects personally identifiable information. This privacy statement applies solely to information collected by the Company's Web sites.
Periodically, our site requests information from users via surveys. Participation in these surveys is completely voluntary and the user therefore has a choice whether or not to disclose this information. Survey information will be used for purposes of monitoring or improving the use and satisfaction of the Company's services. Though we may use an intermediary to conduct these surveys, they may not use customers' personally identifiable information for any secondary purposes.
j2 takes every precaution to protect its user's information. When corporate customers or their end users submit sensitive information via the Company's Web sites, their information is protected both online and off-line.
When our registration form or administrative tool asks users to enter sensitive information (such as credit card number or financial information), that information is encrypted and is protected with the best encryption software in the industry - SSL. While on a secure page, such as our registration form or administrative tool, the lock icon on the bottom of Web browsers such as Netscape Navigator and Microsoft Internet Explorer becomes locked, as opposed to un-locked, or open, when users are just 'surfing'.
While we use SSL encryption to protect sensitive information online, we also employ security measures to protect user-information off-line. All of our users' information, not just the sensitive information mentioned above, is restricted in our offices. Only employees who need the information to perform a specific job (for example, our billing clerks or a customer service representative) are granted access to personally identifiable information. Finally, the servers that store personally identifiable information are in a secure environment.
Supplementation of Information
Notification of Changes
The Company is a participant in the Safe Harbor program developed by the U.S. Department of Commerce and the European Union. We have certified that we adhere to the Safe Harbor Privacy Principles agreed upon by the U.S. and the E.U. For more information about the Safe Harbor and to view our certification, visit the U.S. Department of Commerce's Safe Harbor website(http://export.gov/safeharbor/).