We collect information that you submit to us voluntarily when you use our site or Apps. We also collect information that you submit in the process of creating or editing your account and user profile on the site. For example, our registration and login process requires you to provide us with your name, valid email address and password of your choice. If you personalize your profile and use the features, we will collect any information you voluntarily provide, and we may also request optional information to maximize the functionality of the site or App, such as your year of birth, gender and other demographic information. We collect information in the form of the content that you submit and other information you choose to submit.
Data obtained from evaluations and program use that is stored locally, is housed in a secure database accessible only to authorized ORCAS team members with a need to access this information. With some of our services, ORCAS must send data to external parties for assembly and analysis, such processing may take place in other jurisdictions, even outside the United States of America. As a part of ORCAS information system design and policy, this data is de-identified and aggregated to protect the privacy of our end-users and partners.
ORCAS’ information systems architecture makes standard use of technologies such as SSL encryption, firewall protection, and intrusion detection systems that help protect data and information housed on these systems. Our products are hosted in protected server environments that use these advanced security technologies in addition internal security procedures to help prevent disruption or unauthorized access to data and information systems from external security threats. We make reasonable efforts to protect your data. However, we cannot guarantee the privacy of information that is sent over the Internet. Your confidentiality will be kept to the degree allowed by the technology.
Some ORCAS products are able to integrate data from third-party databases and products. Third-party technology that may be appropriate or necessary for use with some ORCAS software is specified in the related documentation for those products. Any data obtained in this manner is subject to the same level of security and access restriction as data obtained from native ORCAS applications and products. (See data security.)
When you visit any of ORCAS’ support links, or send e-mails to us, you are communicating with us electronically. You consent to receive communications from us electronically. We will communicate with you using methods such as e-mail, SMS, push notifications, or by posting notices on the particular site accessed. You agree that all agreements, notices, disclosures and other communications that we provide to you electronically satisfy any legal requirement that such communications be in writing.