At TrackPath (“we”, “us”, “our”), we respect the privacy of our users and are committed to protecting it through our compliance with this Privacy Policy. This Policy describes the types of information we may collect from you or that you may provide to us and our practices for collecting, using, maintaining, protecting, and disclosing that information.
Personal Information: We may collect personal information such as name, email address, phone number, and other relevant information that you provide to us voluntarily.
Usage Data: We may also collect information on how our Service is accessed and used. This may include information like your computer’s IP address, browser type, and other similar data.
We use the collected data for various purposes, such as:
We do not sell or share your personal information with third parties for their direct marketing purposes without your explicit consent. We may disclose your personal information if required to do so by law or in response to valid requests by public authorities.
We value your trust in providing us with your personal information and strive to use commercially acceptable means of protecting it. However, no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and we cannot guarantee its absolute security.
We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the “effective date” at the top of this Privacy Policy.
If you have any questions about this Privacy Policy, please contact us at [email protected].
This Policy is effective as of Feb. 1, 2023 and supersedes any previous versions.
This Information Security Policy (“Policy”) has been established by TrackPath (“we”, “us”, “our”) to safeguard the information resources that are crucial to the completion of our corporate objectives and business goals. This policy is applicable to all employees, contractors, consultants, temporaries, and other workers at TrackPath, including all personnel affiliated with third parties.
Information Classification: All information created, used, and handled within the organization will be categorized based on the sensitivity and value to the company. Categories include public, internal, confidential, and restricted.
Access Control: We implement appropriate measures to prevent unauthorized access to our systems and data. Access to information will be based on job responsibilities and on the principle of least privilege.
User ID and Passwords: All authorized users are given a unique identifier and use robust passwords that must be changed regularly. Sharing of these identifiers and passwords is prohibited.
Data Encryption: Encryption tools and techniques will be used to protect stored data and data in transit across our networks.
Security Incident Reporting: Any perceived or actual security incidents must be immediately reported to our IT Department or the designated Information Security Officer.
Business Continuity Planning: A business continuity plan is in place to ensure continued operations in case of significant disruptions or disasters.
Failure to comply with this Policy may result in disciplinary actions up to and including termination for employees. Any individual found to have violated this policy may also be held legally liable for damages incurred by TrackPath.
This Policy will be reviewed and updated as needed, but at least annually, to ensure it reflects changes in operational procedures, technology, and legal and regulatory requirements.
If you have any questions or concerns about this policy, please contact [email protected].
This Policy is effective as of February 1, 2023 and supersedes any previous versions.
This Network Security Policy (“Policy”) is established by TrackPath (“we”, “us”, “our”) to safeguard our network and related IT infrastructure against potential security threats. This Policy applies to all individuals who have access to TrackPath’s computing resources and network.
Firewalls and Routers: All network devices will be configured and managed to ensure maximum security. Only necessary services and ports will be exposed and allowed.
Intrusion Detection and Prevention: Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) will be used to monitor and control network traffic.
Remote Access: Secure methods for remote access will be implemented and controlled. This includes the use of Virtual Private Networks (VPN) and strong authentication mechanisms.
Network Segmentation: Sensitive information and systems will be segregated from other parts of the network using techniques like VLANs and firewalls.
Wireless Networks: Wireless networks will be configured securely, including the use of encryption and secure authentication methods.
Network Testing: Regular network security audits, vulnerability scanning, and penetration testing will be conducted to identify and rectify security vulnerabilities.
Non-compliance with this policy may result in disciplinary action, up to and including termination for employees. Individuals found to have violated this policy may also be held legally accountable for damages incurred by TrackPath.
This Policy will be reviewed and updated as necessary, but at least annually, to ensure it reflects changes in operational procedures, technology, and legal and regulatory requirements.
If you have any questions or concerns about this policy, please contact [email protected].
This Policy is effective as of Feb 1, 2023 and supersedes any previous versions.
The purpose of this Risk Management Policy (“Policy”) established by TrackPath (“we”, “us”, “our”) is to outline our commitment to identifying, evaluating, and managing risks that could potentially affect our operations or objectives. This Policy is applicable to all employees, contractors, and affiliated parties.
Risk Identification: We are committed to identifying risks in all areas of our operations. This includes but is not limited to financial, operational, technological, reputational, and compliance risks.
Risk Assessment: Identified risks will be assessed based on their likelihood of occurrence and potential impact on our operations and objectives.
Risk Treatment: Strategies for managing risks will be developed based on the results of the risk assessment. This may include risk avoidance, mitigation, transfer, or acceptance.
Monitoring and Review: The risk management process will be continuously monitored and reviewed to ensure its effectiveness. Any necessary improvements will be implemented.
Communication and Consultation: We are committed to effectively communicating and consulting with relevant stakeholders about risks and risk management strategies.
Non-compliance with this policy may result in disciplinary action, up to and including termination for employees. Any individual found to have violated this policy may also be held legally accountable for damages incurred by TrackPath.
This Policy will be reviewed and updated as necessary, but at least annually, to ensure it reflects changes in our business environment, legal and regulatory requirements, and operational procedures.
If you have any questions or concerns about this policy, please contact [email protected].
This Policy is effective as of Feb. 1, 2023 and supersedes any previous versions.