% Response.CacheControl = "no-cache" Response.AddHeader "Pragma", "no-cache" Response.AddHeader "cache-control", "no-store" Response.Buffer = TRUE Response.Clear Response.Expires = 0 Response.Expiresabsolute = Now() - 4 %>
GoodFund is committed to protecting the personal information of all its service users. We recognize our obligation to keep personal information secure and believe that it is important for our customers to know how we treat their personal information. This policy applies to personal information collected by GoodFund about applicants to GoodFund and visitors to its web site.
GoodFund collects from time to time personal information (name, address, email address, etc.) about applicants and enquiries. We will let you know if we are requesting any information that is not essential to any GoodFund activity. We also collect personal information about your visits to our web site. We collect information directly from applicants and visitors when they voluntarily submit their personal information to us. At certain parts of our web site, we may provide the opportunity for users to request information.
When this sort of information is collected we will provide the reason for collecting the information and how the information will be used. We reserve the right to add to this list of opportunities available to our users to interact with us. It is completely up to users to provide us with their personal information.
Use of Collected Information
Generally, our existing and potential customers are informed of the use of their personal information at the time of collection. Personal information provided to us or collected by us will be used to respond to inquiries, process requests or provide our services and these may include:administering GoodFund and generally providing the services requested of us;
GoodFund may, therefore, disclose personal data:
Our web-sites may contain links to other sites. Although utmost care is exercised in providing links to sites that share our high standards, GoodFund shall not be responsible for the content, security, availability and privacy practices used by such linked sites. The linked pages are provided for the convenience of our site users only and do not constitute an approval of their services or practices. Links from other web-sites to our home page do not require prior permission from us but deep linking into any other page of our site should not be effected without prior permission from us.
You have legal rights of access to personal information that we hold about you and may review or update any personal information that is provided to us or collected through this web site on written request to us. You can also inform us that you do not want us to send you written communications as discussed in "Information Collected" above. If you want to exercise these rights or have any queries regarding this policy please e-mail email@example.com.
As information security is critical to our activities GoodFund attaches a lot of importance to the security of personal information. We handle personal information with commitment to ensure a secure environment that can be trusted to fulfil all confidentiality requirements.
Documented steps are taken to safeguard information according to established security standards and procedures and we continually assess and use cutting-edge technology for protecting information. Personal and confidential information used in transactions are kept confidential.
GoodFund is committed to ensuring information confidentiality through the use of state-of-the-art information security practices, controls, policies and procedures. GoodFund uses and maintains strict physical, electronic and administrative safeguards to protect user's personal information from unauthorised or inappropriate access. Personal information collected by us is stored in secure operating environments that are not accessible by the public.
Employees, business partners and affiliates who misuse a user's personal information are subject to legal or disciplinary actions. The company uses a comprehensive and effective security management program for the purpose of eliminating the risks posed by potential threats to the company's electronic information resources. The controls that have been put in place work to ensure that the company's systems are protected against unauthorised access, disclosure, modification or destruction. Any person or group that accesses the company's web-site and other e-systems must, however, recognise the responsibility to preserve the security and confidentiality of resources/systems and respect the right of other users.