Links to Third-Party Sites
The linked sites are not under the control of ACS Security and ACS Security is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. ACS Security is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by ACS Security of the site.
Copyright ©2022 ACS Security. All rights reserved. Any rights not expressly granted herein are reserved. For legally-based questions concerning Trademarks or Copyrights, send email to: firstname.lastname@example.org.
Welcome to www.acssecurity.com. This Website is provided as a service to our customers. Please review the following basic rules (“Terms”) that govern your use of our Website (the “Website Agreement”). Please note, your use of our Website constitutes your unconditional agreement to follow and be bound by the Terms. Although you may “bookmark” a particular portion of this Website and thereby bypass this Website Agreement, your use of this Website still binds you to the Terms. ACS Security reserves the right to update or modify these Terms at any time without prior notice or your express acceptance. Your use of the www.acssecurity.com Website following any such change constitutes your unconditional agreement to follow and be bound by the Terms as changed. For this reason, we encourage you to review these Terms whenever you use this Website.
Copyrights and Trademarks
Unless otherwise noted, all materials, including images, text, illustrations, designs, icons, photographs, programs, video clips, written content and other materials that are part of this Website are copyrights, trademarks, trade dress and/or other intellectual property owned, controlled or licensed by ACS Security to one of its affiliates or by third parties who have licensed their materials to ACS Security and are protected by U.S. and international copyright and/or trademark laws. The compilation (meaning the collection, arrangement, and assembly) of all content on this Website is the exclusive property of ACS Security and is also protected by U.S. and international copyright laws. ACS Security and its suppliers and licensors expressly reserve all intellectual property rights in all text, programs, products, processes, technology, content and other materials which appear on this Website. Access to this Website does not authorize anyone to use any name, logo or mark in any manner. ACS Security is not responsible for the content of any third party site and does not make any representations regarding the content or accuracy of material on such sites. If you decide to link to any such third party websites, you do so entirely at your own risk.
Use of this Website
The Content contained on this Website is (“Content”) intended solely for personal, non-commercial use. You may download or copy the Content and other downloadable materials displayed on this Website for your personal use only. No right, title or interest in any downloaded materials or software is transferred to you as a result of any such downloading or copying. You may not reproduce (except as noted above), publish, transmit, distribute, display, modify, create derivative works from, sell or participate in any sale of or exploit in any way, in whole or in part, any of the Content on this Website. The Content and software on this Website may be used only for informational purposes. Any other use, including the reproduction, modification, distribution, transmission, republication, display, or performance, of the content on this Website is strictly prohibited.
Users are prohibited from violating or attempting to violate the security of this Website, including, without limitation, (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization; (c) attempting to interfere with service to any user, host or network, including, without limitation, via means of submitting a virus to this Website, overloading, “flooding”, “spamming”, “mailbombing” or “crashing”; (d) sending unsolicited email, including promotions and/or advertising of products or services; or (e) forging any TCP/IP packet header or any part of the header information in any email or newsgroup posting. Violations of system or network security may result in civil or criminal liability. ACS Security will investigate occurrences that may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations. You agree not to use any device, software or routine to interfere or attempt to interfere with the proper working of this Website or any activity being conducted on this Website. You agree, further, not to use or attempt to use any engine, software, tool, agent or other device or mechanism (including without limitation browsers, spiders, robots, avatars or intelligent agents) to navigate or search this Website other than the search engine and search agents available from ACS Security on this Website and other than generally available third-party web browsers (e.g., Netscape Navigator, Microsoft Explorer).
This Website Agreement represents the complete agreement between ACS Security and you and supersedes all prior agreements and representations between us (exluding any agreements between both parties pertaining to monitoring services). If any provision of this Website Agreement is held to be unenforceable for any reason, such provision shall be reformed only to the extent necessary to make it enforceable, and the other terms of this Website Agreement shall remain in full force and effect. The failure of ACS Security to act with respect to a breach of this Website Agreement by you or others does not constitute a waiver and shall not limit ACS Security’s rights with respect to such breach or any subsequent breaches. This Website Agreement shall be governed by and construed under California law as such law applies to agreements between residents entered into and to be performed within California. Any action or proceeding arising out of or related to this Website Agreement or your use of this Website must be brought in the state or federal courts of California within one year of the time the claim arises.
All comments, feedback, mail, suggestions, ideas, and other submissions disclosed, submitted or offered to ACS Security on or by this Website or otherwise disclosed, submitted or offered in connection with your use of this Website (collectively, the “Comments”) shall be and remain ACS Security’s property. Such disclosure, submission or offer of any Comments shall constitute an assignment to ACS Security of all worldwide rights, titles and interests in all copyrights and other intellectual properties in the Comments. Thus, ACS Security will own exclusively all such rights, titles and interests and shall not be limited in any way in its use, commercial or otherwise, of any Comments. ACS Security is and shall be under no obligation (1) to maintain any Comments in confidence; (2) to pay to user any compensation for any Comments; or (3) to respond to any user Comments. You agree that no Comments submitted by you to this Website will violate any right of any third party, including copyright, trademark, privacy or other personal or proprietary right(s). You further agree that no Comments submitted by you to this Website will be or contain libelous or otherwise unlawful, abusive or obscene material. You are and shall remain solely responsible for the content of any Comments you make. We welcome your comments regarding this Website.
LINKING TO THIS WEBSITE
LINKING TO THE THIS WEBSITE INDICATES THAT YOU ACCEPT THESE TERMS AND, IN ADDITION, THAT YOU WILL NOT: Replicate any Content; imply that ACS Security is endorsing you, your company or business, your Website or its contents, your products, or your services or otherwise misrepresent you or your Website’s relationship with ACS Security; link to any page of this Website other than the home page; present false, misleading or inaccurate information about, or disparage, ACS Security, it’s products or services, or any of its affiliates or their products or services; use ACS Security’s trademarks, logos, or copyrighted materials without first receiving express prior written permission from ACS Security, including content on your Website that is, or could be, construed as illegal, offensive, or controversial or inappropriate for any age group.
We have made every effort to display as accurately as possible the colors of our products that appear on this Website. However, as the actual colors you see will depend on your monitor, we cannot guarantee that your monitor’s display of any color will be accurate.
You agree to defend, indemnify and hold ACS Security and its affiliates harmless from and against any and all claims, damages, costs and expenses, including attorneys’ fees, arising from or related to your use of this Website.
THIS WEBSITE IS PROVIDED BY ACS Security ON AN “AS IS” AND “AS AVAILABLE” BASIS. ACS Security MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, AS TO THE OPERATION OF THIS WEBSITE OR THE INFORMATION, CONTENT, MATERIALS, OR PRODUCTS INCLUDED ON THIS WEBSITE NOR THAT THIS WEBSITE OR ANY MATERIALS WHICH MAY BE DOWNLOADED ARE FREE OF INFECTION OR VIRUSES, WORMS, TROJAN HORSES, OR OTHER CODE THAT MANIFEST CONTAMINATING OR DESTRUCTIVE PROPERTIES. TO THE FULL EXTENT PERMISSIBLE BY APPLICABLE LAW, ACS Security DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. WITHOUT LIMITING THE FOREGOING, ACS Security DISCLAIMS ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, FOR ANY MERCHANDISE OFFERED ON THIS WEBSITE. YOU ACKNOWLEDGE, BY YOUR USE OF THE www.acssecurity.com WEBSITE, THAT YOUR USE OF THIS WEBSITE IS AT YOUR SOLE RISK. THIS DISCLAIMER DOES NOT APPLY TO ANY PRODUCT WARRANTY OFFERED BY THE MANUFACTURER OF THE ITEM. THIS DISCLAIMER CONSTITUTES AN ESSENTIAL PART OF THIS AGREEMENT. SOME STATES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, SO THE FOREGOING LIMITATIONS MAY NOT APPLY TO YOU.
Limitation of Liability
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL OR EQUITABLE THEORY, WHETHER IN TORT, CONTRACT, STRICT LIABILITY OR OTHERWISE, SHALL ACS Security OR ANY OF ITS EMPLOYEES, DIRECTORS, OFFICERS, AGENTS, VENDORS OR SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL LOSSES OR DAMAGES OF ANY NATURE ARISING OUT OF OR IN CONNECTION WITH THE USE OF OR INABILITY TO USE THE www.acssecurity.com WEBSITE, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF GOODWILL, LOSS OF DATA, WORK STOPPAGE, ACCURACY OF RESULTS, OR COMPUTER FAILURE OR MALFUNCTION, EVEN IF AN AUTHORIZED REPRESENTATIVE OF ACS Security HAS BEEN ADVISED OF OR SHOULD HAVE KNOWN OF THE POSSIBILITY OF SUCH DAMAGES.
The information that you give us and information about services purchased may be combined with other personally identifiable information (such as demographic information and past purchase history) available from our records and other sources. This information will be used to make our future marketing efforts more efficient. This information may also be shared with other marketers to bring you offers of interest. If you prefer that we do not share your name and address with other marketers, please email us at email@example.com.
Last Revised: September 2022
Your Privacy at ACS Security
In providing our products and services, we often receive sensitive information from and about our customers, including financial and business information, some of which constitutes personal information. Overall, personal information constitutes all information capable of being employed in some way to identify, contact someone, or determine someone’s location. Names, physical addresses, mailing addresses, driver’s license numbers, social security numbers, email addresses, phone numbers, bank account numbers, are considered types of personal information. Moreover, in some contexts, personal information may also include other information that can reasonably connect to a specific person, such as internet protocol (IP) addresses, unique device identification numbers, employment information, medical information and internet activity. We may have collected the following personal information within the past twelve (12) months.
- Identification: name, postal address, telephone number, unique personal identifier, internet protocol address, email address, account name, signature.
- Financial Information: social security number, insurance policy number, bank account number, credit card number and debit card number.
- Commercial information: records of products and services purchased and obtained from
- Internet or Network Activity: browsing history and information regarding your interaction with our services.
- Precise geolocation
- Alarm triggered audio.
- Professional or Employment Information: education and employment history for job applicants
Non-personal information is any aggregated information or information that does not identify, or cannot be reasonably linked to, any individual. For example, data regarding the number of times a particular link on a website is selected or regarding the number of visitors to a website are examples of non-personal information.
How We Collect Personal Information (Sources)
We collect information directly from you when you interact with our website and our chat feature. We also collect information when you contact us by telephone and in person.
We collect information about you from third parties. For example, our business partners or clients may give us information about you.
We collect information from you passively where permitted. We may collect personal information about users over time and across different websites when you use our services. We may also have third parties that collect personal information this way. We may do this using tracking tools like browser cookies and web beacons and though services providers such as Google Analytics.
To learn more about Google Analytics and how to opt out, please visit “How Google Uses Information From Sites or Apps That Use Our Services” at www.google.com/policies/privacy/partners/.
a. Cookies and Web Beacons
Cookies are small text files that are downloaded to the browser of a computer, tablet, or smartphone used to visit a website. A web beacon, also known as an internet tag, pixel tag, or clear GIF, is a tiny graphic image that may be used in our websites or emails
Cookies and web beacons may identify your browser, help you log-in, and improve the navigation of a website. We use these features to help us improve the performance of our services. For example, cookies allow us to review the number of visitors to our website and a visitor’s usage patterns; to track key performance indicators such as pages visited, frequency of visits, downloads, and other statistical information; whether a visitor views the mobile or desktop version of our website; to recognize you if you return to our website; to store information about your past visits, and to remember your preferences.
b. Controlling Cookies and “Do Not Track” Requests
You can control cookies and other tracking tools. Your browser may give you the ability to control cookies or other tracking tools. How you do so depends on the type of tool. Certain browsers can be set to reject browser cookies. If you block cookies on your browser, certain features of our services may not work. Choices you make are both browser and device-specific. If you block or delete cookies, not all of the tracking that we have described in this policy will stop. Some browsers have a “Do Not Track” feature that lets you tell websites that you do not want to have your online activities tracked. These features are not yet uniform. We are not currently set up to respond to those signals. You can control cookies and other tracking tools on your mobile devices. For example, you can turn off the GPS locator or push notifications on your phone.
How We Use or Process Personal Information
We do not sell personal information and do not intend to sell personal information in the future. We may use or process the information that we collect to:
- Manage our business operations and perform our
- Fulfill or meet the reasons you provided us the information, including to process your requests, transactions or payments, to prevent transaction fraud to provide customer service and to dispatch services to your secured
- Maintain and service customer accounts and verify customer
- To administer a contest, promotion, survey or other site
- To ask for ratings and reviews of services or
- Provide insurance
- Send you information about new products and special
- Help maintain the safety, security, and integrity of our services, website, and other technical assets.
- Improve, develop, debug, modify or support our services, website, and other similar internal purposes (including using analytics to analyze our website’s traffic and optimize its performance).
- Respond to your inquires, process your requests concerning your personal information in our possession, to investigate and address your concerns, and to monitor and improve our
- Respond to lawful requests for information through court orders, subpoenas, warrants and other legal process, obligations or governmental
- Consider individuals for employment and contractor
- For employees only: to administer and provide compensation and benefits, to communicate with employees and their designated emergency contacts, to perform other human resource related activities, and to comply with employment law obligations.
With Whom We Share Personal Information
We share personal information with third parties who perform services on our behalf. We may share personal information with service providers who help us operate, test, and improve our services.
For example, your personal information may be stored on our behalf on third-party cloud providers including Alarm.com, Amazon Web Services, Microsoft Azure, Salesforce and WP Engine.
We also use Google Analytics, which is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our website. This data may be shared with other Google services. Google may use the collected data to contextualize and personalize the ads of its own advertising network.
We share personal information with payment processing vendors to fulfill or meet the reasons you provided us the information, including to process your requests, transactions or payments, to prevent transaction fraud, and to provide customer service.
For example, we share personal information with Alarm.com and DocuSign to process your transactions and to provide services to you.
We and our clients share information with business partners.
For example, we or our clients may share information with third parties who co-sponsor a promotion. These partners may send you information about events and products by mail or email.
We share information if we think we have to in order to comply with a legal investigation or to protect ourselves.
For example, we may share information to respond to a court order or subpoena. We may share it if a government agency or investigatory body requests. We may share information when we are investigating potential fraud.
We may share information with any successor to all or part of our business.
For example, if part of our business was sold, we may give our customer list as part of that transaction.
Updating, Correcting or Withdrawing Your Personal Information
It is important that the personal information we have about you is accurate. If any of the personal information you provide us should ever change, for instance if you change your email address or phone number, or should you wish to change your preferences, to stop receiving announcements from us, to correct any inaccurate personal information about you, or to delete any personal information that you provided through your use of our services, please let us know by either following this link, or by sending an email to firstname.lastname@example.org.
For security reasons, we may need to request specific information from you to help us confirm your identity, before we correct, update or delete any personal information you provide us.
Links to Social Media and Third-Party Websites
We are not responsible for the privacy or security of any information you provide to a third-party website or the information practices used by any third-parties, including links to any third-party site from our website. We make no representations, express or implied, concerning the accuracy, privacy, safety, security, or the information practices of any third-parties. The inclusion of a link to a third-party site on our services does not constitute any type of endorsement of the linked site by us. We are not responsible for any loss or damage you may sustain resulting from your use of any third-party website or any information you share with a third-parties.
We have implemented appropriate physical, administrative, technical, and organizational security measures, including encryption, to protect your personal information from inadvertent or unauthorized access, use, disclosure, alteration, or destruction. No method of data storage or data transmission over the Internet, however, is guaranteed to be completely secure. Your use of our services, and any personal information that you transmit over the Internet to us, is at your own risk.
Our Services Are Not Directed at and Not Intended to be Used by Minors Under Age 13.
We do not knowingly collect personally identifiable information from children under 13 without permission from a parent or guardian. No visitor to our services who is a minor or under the age of 13 should provide any personal information to us. If you are a minor under the age of 13, do not use our services and do not send any type of personal information about yourself to us.
If you are a parent or legal guardian and think your child under age 13 has given us information, email us at email@example.com. You can also write to us at the address listed at the end of this policy. Please mark your inquiries “COPPA Information Request.”
Because we do not sell personal information, we do not sell the personal information of consumers regardless of whether they are age 15 or 51.
Additional Privacy Notice for California Residents
If you are a California resident, you may ask us to disclose what personal information we have about you and what we do with that information, to delete your personal information and not to sell your personal information. You also have the right to be notified, before or at the point we collect your personal information, of the types of personal information we are collecting and what we may do with that information.
a. Collection, Use and Sharing Practices
b. Your Right to Know
You may request that we disclose to you what personal information we have collected, used, shared, or sold about you, and why we collected, used, shared, or sold that information. Specifically, you may request that we disclose:
- The categories of personal information
- Specific pieces of personal information
- The categories of sources from which we collected personal information.
- The purposes for which we use the personal
- The categories of third parties with whom we share the personal
- The categories of information that we sell or disclose to third
c. Limitation of Use
You have the right to request that we limit the use of your personal information to that use which is necessary to perform the services or provide the goods reasonable expected by an average consumer who requests those goods or services.
d. Your Right to Delete
You may request that we delete personal information we collected from you and to tell our service providers to do the same. However, there are many exceptions that allow us to keep your personal information. For example, we may deny your request to delete for the following reasons:
- If we cannot verify your
- To comply with a legal obligation.
- To complete the transaction for which the information was collected, provide a good or service you requested, perform a contract with you, to fulfill the terms of a written warranty or product recall conducted in accordance with federal law, or take actions reasonably anticipated in the context of our ongoing business relationship with
- To detect security incidents, protect against deceptive, malicious, fraudulent, or illegal activity, or to prosecute those responsible for that
- To debug products, services, or applications and to identify and repair errors that impair existing
- To exercise free speech, to ensure the rights of others to exercise their free speech rights, or to exercise another right provided by
- To comply with the California Electronic Communications Privacy Act (Cal. Penal Code 1546 et. seq.).
- To enable solely internal uses that are reasonably aligned with consumer expectations based upon your relationship
- To make other internal and lawful uses of the information that are compatible with the context in which you provided the
- If the personal information is certain medical information, consumer credit reporting information, or other types of information exempt from the CCPA.
You have the right to not be discriminated against if you exercise CCPA privacy rights. We will not discriminate against you for exercising any of your CCPA rights. This means, for instance, that we will not deny you services, charge you a different price, including a discount or other benefit or impose a penalty for the exercise of your CCPA rights.
f. How To Exercise Your Privacy Rights
You can exercise these rights in several ways
- You can use this Web Form.
- You can make a request by calling 888-642-4567 toll
- You can submit a request via email to firstname.lastname@example.org.
- You can send a request by mailing it to 100 Bel Air Road, Los Angeles, CA 90077, to the attention of Cheri Fletcher, General Counsel.
You may make the request on your own behalf or on behalf of your minor child. Another person who is legally authorized to act on your behalf may also submit a request for you. Please describe your request in sufficient detail to allow us to understand the nature of the request, evaluate and respond to it. Please provide sufficient information with your request to allow us to verify that you are the person about whom we collected personal information, or an authorized representative of that person.
We will promptly acknowledge receipt of your request and begin our verification process.
g. How We Will Verify and Respond
Before we respond to any request involving personal information, the CCPA requires that we confirm the identity of the person making the request, and if the request is made on behalf of another person, their authority to make the request on the other person’s behalf. We are not obligated to provide or to delete any information pursuant to your request if we are unable to adequately verify your identity or the identity of the person making the request on your behalf.
Accordingly, we reserve the right to deny any request where we are unable to satisfactorily confirm your identity. If you have authorized someone to make a request on your behalf, we reserve the right to deny the request if we are unable to adequately verify the identity of that person or if we are unable to verify that the individual making the request is authorized to act on your behalf.
We will attempt to verify your identity by matching any information provided in your request against the personal information already in our possession. If you have authorized someone to make a request on your behalf, we will attempt to verify the identity of that person. We will also seek to confirm that you have authorized that person to submit a request on your behalf, which may include requesting a copy of any written authorization or power of attorney for the request. This process does not require that you establish any type of account with us, or sign up to receive any of our services.
The amount of information we may require in our verification process will depend on a variety of factors, including the nature of your request, the type, sensitivity, and value of the personal information in our possession, the potential risk of harm that could result from any unauthorized access to or deletion of your personal information, the likelihood that fraudulent or malicious actors would seek your information, and whether the information provided to us in your request is sufficient to protect against fraudulent requests or being fabricated or spoofed. For instance, we will require more points of confirmation if you request that we disclose specific pieces of information rather than categories of information in our possession. Concerning a request to delete information, once we confirm your identity we will separately confirm that you want the information deleted.
During our verification process, we may request additional information from you. Any information provided to us during our verification process will only be used for purposes of verifying your identity or the identity and/or authority of the person making the request.
We will endeavor to respond within forty-five (45) days of receipt of your request. If, however, we are unable to respond within that time, we will notify you of the reason and the additional time needed to make our response. The CCPA permits us to extend the time of our response by up to an additional forty-five (45) days.
If we deny a request in whole or in part, we will endeavor to explain the reasons for our denial.
h. CCPA’s Limitations on Disclosures
We are not obligated under the CCPA to respond to any request where compliance or disclosure would violate an evidentiary privilege under California law or conflict with federal or state law.
The CCPA does not require that we provide personal information to you more than twice in a twelve month period.
Any disclosures we make may only cover the twelve (12) month period preceding the request.
We will not charge a fee to process or respond to your request and will provide information free of charge. Where a person’s requests are repetitive, manifestly unfounded, or excessive, the CCPA authorizes us to either charge a reasonable fee that takes into account our administrative costs, or refuse to act on the request and notify the person making the request our reason for refusing the request. If we determine that a request warrants a fee, we will explain our decision and will endeavor to provide you with a cost estimate.
Regulations proposed by the California Attorney General prohibit us from disclosing specific pieces of personal information if the disclosure creates a substantial, articulable, and unreasonable risk to the security of that information or the security of our systems or networks. These proposed regulations further prohibit us from disclosing in response to your request a social security number, driver’s license number, other government issued identification number, financial account number, any health insurance or medical identification number, an account password or security questions and answers.
Other California Privacy Rights
The California Civil Code permits California Residents with whom we have an established business relationship to request that we provide you with a list of certain categories of personal information that we have disclosed to third-parties for their direct marketing purposes during the preceding calendar year. To make such a request, please send an email to email@example.com. or write to us at the address listed below. Please mention that you are making a “California Shine the Light” inquiry.
You can also write to us at:
Attention: Cheri Fletcher
100 Bel Air Road
Los Angeles, CA 90077
How Our Company Collects Personal and Non-Personal Information
We may collect information whenever customers use our website, products, or services. The information we gather can include email addresses, home addresses, phone numbers, Social Security Numbers, payment information such as credit or debit card information, dates of birth, in addition to other types of information.
-Website Information Collected
Our website may collect your type of browser, Internet Protocol (IP) addresses, Internet Service Provider (ISP), operating system, and other pieces of information, and save this all automatically in what are known as log files. Through your use of our website, may be able to gather information relating to data and event information from your device(s) through the use of cameras or other sensory monitors. Moreover, our website may employ technology known as web beacons to monitor your actions on our website. In addition, if you use a mobile or other device to access or download our company’s services, we may gather information regarding your location for dispatching our services or in order to provide such information to emergency services if need be. You can refuse these location-related services through your device prompts or settings. We will retain information pertaining to your device‘s type, operating system, and other information. The information we collect through your mobile or other device may pertain to the software contained therein. We do not label or connect the activity we record in this manner with any personal information you provide us through our applications. This recorded information may relate to the frequency with which you use our application, actions you take during the use of our application, and data relating to performance, among other things.
-Particular Information Collected by Your Use of Our Devices, Products, or Services
The following are some types of information that we may gather from you when you use certain of our devices, products, or services: pictures or images, audio-only, video-only, or audiovisual information that is recorded by monitoring devices; device information relating to motion detection and weather or climate data; and GPS information.
How Our Company Uses Personal and Non-Personal Information
Overall, we use the personal and non-personal information we collect from you to better provide you with our services or products. Additionally, may use your personal and non-personal information to further our company’s business purposes. This may involve our company using your personal or non-personal information to increase the efficiency of our company’s services and learn from past transactions; to increase the efficiency and interface of our website; to enable you to create an online account on our company website; to ensure that you receive the services, products, or information you desired from us; to inform you of promotional events or happenings that may be of interest to you; to inform you of promotional offers, packages, or sales we are offering; to further develop and innovate our products and services; to combat fraudulent activities involving our services or products; and to survey customers regarding our services, products, and website, in addition to other uses.
Disclosure of Personal Information
We may disclose personal information we collect from you: (1) to contractors, service providers, and other third parties we use to support our business; (2) to accomplish the reason or purpose for which you provide it; (3) for any other purpose disclosed by us when you provide the information; (4) to comply with any court order, law or legal process, including responding to any government or regulatory request; (5) to carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including for billing and collections; (6) if we believe disclosure is necessary or appropriate to protect the rights, property or safety of us, our customers or others; or (7) with your consent. We do not sell or otherwise share personal information with third parties for direct marketing purposes.
While our company does its best to ensure that the personal information you provide us, in any form, is guarded against unauthorized disclosure or access by unauthorized third parties, information shared over the internet can always potentially be compromised by malicious actors or software. We have protocols with regard to both digital and non-digital information in order to reduce the likelihood that your personal information will be compromised or suffer an unauthorized disclosure. Ultimately, any transmission of personal information is at your own risk. We are not responsible for circumvention of any privacy settings or security measures contained on our website.
We do not control these third parties’ tracking technologies or how they may be used. If you have any questions about an advertisement or other targeted content, you should contact the responsible provider directly.
By providing us with personal information you consent to our sharing, collecting, and disclosing of the provided information. Your express consent comes in the form of your direct communication of approval. An example of express consent could stem from a written communication from you to our company authorizing our sharing, collection, and disclosure of your provided information. Your implied consent comes in the form of your non-verbal conduct that indicates approval. An example of implied consent could stem from your decision to enter your personal information into one of our online forms in order to receive our services. Your lack of notice with regard to consent will be construed as an authorization for our company to share, collect, and disclose your provided information. You may revoke your consent to disclose this information, but this may cause difficulties for our company in providing you with our business. Please contact our office at firstname.lastname@example.org to receive more information on this matter.
Minors and Information Collection
While our company’s products and services are intended for a general audience, our products and services are not intended for children. Our website does not knowingly collect personal information online from children below 13 years of age. If we have received personal information from a child below 13 years of age, we ask that a parent or guardian contact us and notify us of the matter so that we can delete the information.
Mailing List Preference
Please include your name and mailing address in the message. If you would like to no longer receive e-mails from ACS Security, please unsubscribe or click on the ‘unsubscribe’ link included in all e-mails sent by ACS Security.
Privacy Rights Under California Law
If you are a California resident, California law may provide you with additional rights regarding our use of your personal information.
- CCPA Privacy Notice
Information We Collect
We collect information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device (“personal information”). In particular, we have collected the following categories of personal information from consumers within the last twelve (12) months:
|A. Identifiers.||A real name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, Social Security number, driver’s license number, passport number, or other similar identifiers.||YES|
|B. Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)).||A name, signature, Social Security number, physical characteristics or description, address, telephone number, passport number, driver’s license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information. Some personal information included in this category may overlap with other categories.||YES|
|C. Protected classification characteristics under California or federal law.||Age (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information).||YES|
|D. Commercial information.||Records of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies.||YES|
|E. Biometric information.||Genetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data.||YES|
|F. Internet or other similar network activity.||Browsing history, search history, information on a consumer’s interaction with a website, application, or advertisement.||YES|
|G. Geolocation data.||Physical location or movements.||YES|
|H. Sensory data.||Audio, electronic, visual, thermal, olfactory, or similar information.||YES|
|I. Professional or employment-related information.||Current or past job history or performance evaluations.||YES|
|J. Non-public education information (per the Family Educational Rights and Privacy Act (20 U.S.C. Section 1232g, 34 C.F.R. Part 99)).||Education records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, student identification codes, student financial information, or student disciplinary records.||YES|
|K. Inferences drawn from other personal information.||Profile reflecting a person’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes.||YES|
Personal information does not include:
- Publicly available information from government records.
- De-identified or aggregated consumer information.
- Information excluded from the CCPA’s scope, like:
- health or medical information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the California Confidentiality of Medical Information Act (CMIA) or clinical trial data;
- personal information covered by certain sector-specific privacy laws, including the Fair Credit Reporting Act (FCRA), the Gramm-Leach-Bliley Act (GLBA) or California Financial Information Privacy Act (FIPA), and the Driver’s Privacy Protection Act of 1994.
We obtain the categories of personal information listed above from the following categories of sources:
- Directly from our customers or their agents. For example, from documents that our customers provide to us related to the services for which they engage us.
- Indirectly from our customers or their agents. For example, through information we collect from our customers in the course of providing services to them.
- Directly and indirectly from activity on our website. For example, from submissions through our website portal or website usage details collected automatically.
- From third-parties that interact with us in connection with the services we perform or products we provide. For example, from outside companies we may use to assist us in providing you with our services or products.
Use of Personal Information
We may use or disclose the personal information we collect for one or more of the following business purposes:
- To fulfill or meet the reason for which the information is provided. For example, if you provide us with personal information so that we can decide whether to recommend services or products such as customizable alerts or security cameras, we will retain and use this information to meet your request.
- To provide you with information, services, or products that you request from us.
- To provide you with email alerts, event registrations and other notices concerning our services, products, events, or news, that may be of interest to you.
- To carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including for billing and collections.
- To improve our website and present its contents to you.
- For testing, research, analysis and development of our services or products.
- As necessary or appropriate to protect the rights, property or safety of us, our customers or others.
- To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.
- As described to you when collecting your personal information or as otherwise set forth in the CCPA.
- To evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held by us is among the assets transferred.
We will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.
Sharing Personal Information
We may disclose your personal information to a third party for a business purpose, but we do not disclose or sell such information for direct marketing purposes. When we disclose personal information for a business purpose, we enter a contract that describes the purpose and requires the recipient to both keep that personal information confidential and not use it for any purpose except performing the contract.
In the preceding twelve (12) months, we have disclosed the following categories of personal information for a business purpose:
Category A: Identifiers.
Category B: California Customer Records personal information categories.
Category C: Protected classification characteristics under California or federal law.
Category D: Commercial information.
Category E: Biometric information.
Category F: Internet or other similar network activity.
Category G: Geolocation data.
Category H: Sensory data.
Category I: Professional or employment-related information.
Category K: Inferences drawn from other personal information.
We disclose your personal information for a business purpose to the following categories of third parties:
- Our affiliates.
- Service providers.
- Third parties to whom you or your agents authorize us to disclose your personal information in connection with products or services we provide to you.
In the preceding twelve (12) months, we have not sold any personal information.
Your Rights and Choices
The CCPA provides consumers (California residents) with specific rights regarding their personal information. This section describes your CCPA rights and explains how to exercise those rights.
Access to Specific Information and Data Portability Rights
You have the right to request that we disclose certain information to you about our collection and use of your personal information over the past 12 months. Once we receive and confirm your verifiable consumer request, we will disclose to you:
- The categories of personal information we collected about you.
- The categories of sources for the personal information we collected about you.
- Our business or commercial purpose for collecting that personal information.
- The categories of third parties with whom we share that personal information.
- The specific pieces of personal information we collected about you (also called a data portability request).
- If we disclosed your personal information for a business purpose, a list indicating disclosures for a business purpose, identifying the personal information categories that each category of recipient obtained.
Deletion Request Rights
You have the right to request that we delete any of your personal information that we collected from you and retained, subject to certain exceptions. Once we receive and confirm your verifiable consumer request, we will delete (and direct our service providers to delete) your personal information from our records, unless an exception applies.
We may deny your deletion request if retaining the information is necessary for us or our service providers to:
- Complete the transaction for which we collected the personal information, provide a good or service that you requested, take actions reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform our contract with you.
- Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity, or prosecute those responsible for such activities.
- Debug products to identify and repair errors that impair existing intended functionality.
- Exercise free speech, ensure the right of another consumer to exercise their free speech rights, or exercise another right provided for by law.
- Comply with the California Electronic Communications Privacy Act (Cal. Penal Code § 1546 ).
- Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement, if you previously provided informed consent.
- Enable solely internal uses that are reasonably aligned with consumer expectations based on your relationship with us.
- Comply with a legal obligation.
- Make other internal and lawful uses of that information that are compatible with the context in which you provided it.
Exercising Access, Data Portability, and Deletion Rights
Only you or a person registered with the California Secretary of State that you authorize to act on your behalf, may make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child.
You may only make a verifiable consumer request for access or data portability twice within a 12-month period. The verifiable consumer request must:
- Provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative.
- Describe your request with sufficient detail that allows us to properly understand, evaluate, and respond to it.
We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you. Making a verifiable consumer request does not require you to create an account with us. We will only use personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.
Response Timing and Format
We endeavor to respond to a verifiable consumer request within 45 days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing. We will deliver our written response by mail or electronically, at your option. Any disclosures we provide will only cover the 12-month period preceding the verifiable consumer request’s receipt. The response we provide will also explain the reasons we cannot comply with a request, if applicable. For data portability requests, we will select a format to provide your personal information that is readily useable and should allow you to transmit the information from one entity to another entity without hindrance.
We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request.
We will not discriminate against you for exercising any of your CCPA rights. Unless permitted by the CCPA, we will not:
- Deny you our services or products.
- Charge you different prices or rates for our services or products, including through granting discounts or other benefits, or imposing penalties.
- Provide you a different level or quality of our services or products.
- Suggest that you may receive a different price or rate for our services or products or a different level or quality of our services or products.
Summary of Updates Made:
|Date of Update||Summary of Changes|
CCPA Requestfor California Residents
Your Information is Secure at ACS Security
We go to great lengths to keep your financial information private and safe. All credit card transactions occur in a secure area of our site, to protect you from any loss, misuse or alteration of information collected. Additionally, we store data with a 3rd party PCI compliant processor.
If you have additional questions regarding security at ACS Security, please call us toll-free at 866-484-4800 or send an e-mail including your name and mailing address to email@example.com.
Your financial information is safe
We use Secure Socket Layers (SSL), the industry standard in transferring information to process your orders. The SSL encrypts, or translates, your order information into a highly difficult to decipher code, which is processed immediately.