1. USE OF INFORMATION COLLECTED: There are only three ways that RS obtains information from you: (1) via registration on www.repscheduler.com; (2) from filling out our contact form or by sending an email to email@example.com; and/or (3) from cookies, tiny bits of electronic information that can be transferred to a computer to uniquely identify that computer's browser, which we use to improve the quality of our services to you by storing information for your account, tracking trends, or to provide other services important to your account.
2. HOW WE USE THE INFORMATION REPSCHEDULER® COLLECTS: Log files, including Internet Protocol addresses, browser information and records of what information you are requesting, such as the page or subject areas you're visiting. Generally, this information is collected from you to communicate with you and operate our features and services. RS also may use this information to present you with additional features or advertising that we believe will be of interest or useful to you. We understand the importance of limiting spam, and do not provide your email to other third parties without prior consent. In addition, if you are a subscriber, you can manage your email communication methods by following the instructions included in the e-mail we send you and may opt-out at any time.
3. STORAGE AND SECURITY OF INFORMATION: Personal Information will be processed and stored by RS in secure databases hosted by at an 88,000 square foot colocation facility hosted by Redit, a leading Southern California provider of Tier III, enterprise grade data centers. To prevent unauthorized access, maintain data accuracy and ensure the correct use of information, RS has put in place appropriate physical, electronic and managerial procedures to safeguard and secure the information RS collects online. RS has taken reasonable steps to protect the information users share with us, including, but not limited to, setup of processes, equipment and software to avoid unauthorized access or disclosure of this information.
We have implemented security measures and systems into the design, implementation and day-to-day operation of our Site. We progressively implement new security measures as they become available on the market. Security measures are primarily to identify and/or block unauthorized intrusions, upload or change information or otherwise cause damage to the Site.
5. CONTACT: Contact information is provided on the Site. In addition, visitors may contact us through the following channels:
Last Updated: July 2020