Photo Emission Tech, Inc. does not sell or rent the information you provide to us online to third parties. This policy describes the personal information we collect about you, why we collect it, how we use it and when we share it with third parties.
Information Collection and Use
Photo Emission Tech, Inc. may collect information that you provide when you send any e-mail to the addresses on our website or fill out one or any of the forms that are, or may be provided, on the Website.
Photo Emission Tech, Inc. may use this information in internal office procedures such as, but not limited to, sending you requested information, contacting you, to provide information about any current and/or future products, services, promotions and corporate-related information with your consent. Our preferred method of contact is e-mail and phone.
The Website makes use of a common Internet technique to compile aggregated statistics about the effectiveness of our advertising campaigns, common navigation paths within the sites, types of browsers and platforms that access the sites, geographical location, and the average connection speeds used to connect to the sites. This information is used to enhance the online experience of our visitors. These technologies do not use or collect personally identifiable information, such as names or address, and do not link online actions to an identifiable person.
The Website may collect IP addresses for the purposes of system administration, to report aggregated information and to audit the use of our website. If we are required to do so by law, for example, in response to a court order or subpoena, we will provide any collected IP addresses to the proper authorities.
Sharing and Disclosure of Your Information to Third Parties
From time to time, Photo Emission Tech, Inc., may team up with other individuals and companies to offer or provide products, services, contests or promotions. Further, Photo Emission Tech, Inc., and the other company or companies may cross-reference customer databases to identify common customers. Photo Emission Tech, Inc., and the other company or companies may use that existing information to identify future promotional opportunities and to fulfill promotional or contractual obligations.
If prior to participating in a promotional activity, you opted not to receive information from us, you may still receive information from or about Photo Emission Tech, Inc., in connection with the promotion if you choose to participate in it. You may opt not to participate in these promotions if you do not want to receive information about Photo Emission Tech, Inc., or share your information with Photo Emission Tech, Inc., and the other companies sponsoring such promotions.
Removal of Information
Photo Emission Tech, Inc., will retain in its files some information you may have requested to remove to prevent fraud, resolve disputes, troubleshoot problems, assist with any investigations, enforce our Site Use Policy and comply with legal requirements as is permitted by law. Therefore, you should not expect that all of your information will be completely removed from our databases in response to your requests. However, such information will only be available to select Photo Emission Tech, Inc. personnel.
Cookies and Applets Use
You may delete these files from your computer at any time. You can set your web browser to notify you if such information is about to be placed on your computer, and you can choose the option in your web browser to refuse it. If you refuse the information, you may not be able to make full use of the features on our website.
Links To and From photoemission.com to Other Websites
Your information is stored on photoemission.com servers located in the United States. We use procedural and technical safeguards to protect your personal information against loss or theft as well as unauthorized access and disclosure to protect your privacy, including encryption, "firewalls" and Secure Socket Layers. We treat data as an asset that must be protected against loss and unauthorized access. We employ different security techniques to protect such data from unauthorized access by users inside and outside the company. However, "perfect security" does not exist on the Internet.