top of page





This Privacy Policy describes Valor Technologies’ policies and procedures on collecting, using, and disclosing your information when you use this website and tells you about your privacy rights and how the law protects you. We use your personal data to provide and improve our services. Using the website, you agree to the collection and use of information per this Privacy Policy.

Interpretations and Definitions

The following words have meanings defined under the following conditions. These definitions shall have the same meaning regardless of whether they appear in singular or plural.


For the purposes of this Privacy Policy:


  • Account means a unique account created for you to access any part of our website.

  • Business, for the purpose of the CCPA (California Consumer Privacy Act), refers to the Company as the legal entity that collects Consumers’ personal information and determines the purposes and means of the processing of Consumers’ personal information, or on behalf of which such information is collected and that alone, or jointly with others, determines the purposes and means of the processing of consumers’ personal information, that does business in the State of California.

  • Company (referred to as either “the Company,” “We,” “Us” or “Our” in this Agreement) refers to Valor Technologies LLC 324 E. Wisconsin Ave, STE 710 Milwaukee, WI 53202.

  • Consumer, for the purpose of the CCPA (California Consumer Privacy Act), means a natural person who is a California resident. A resident, as defined in the law, includes (1) every individual who is in the USA for other than a temporary or transitory purpose, and (2) every individual who is domiciled in the USA who is outside the USA for a temporary or transitory purpose.

  • Cookies are small files that are placed on your computer, mobile device, or any other device by a website, containing the details of your browsing history on that website among its many uses.

  • Country refers to: Wisconsin, United States

  • Device means any device that can access the website such as a computer, cellphone, or tablet.

  • Do Not Track (DNT) is a concept promoted by US regulatory authorities, in particular the US Federal Trade Commission (FTC), for the Internet industry to develop and implement a mechanism allowing internet users to control the tracking of their online activity across websites.

  • Personal Data is any information that relates to an identified or identifiable individual. For the purposes of the CCPA, Personal Data means any information that identifies, relates to, describes, or is reasonably associated with, or linked to, directly or indirectly, with you.

  • Sale, for the purpose of the CCPA (California Consumer Privacy Act), means selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating orally, in writing, or by electronic or other means, a consumer’s personal information to another business or a third party for monetary or other valuable consideration.

  • Service Provider means any natural or legal person who processes the data on behalf of the company. It refers to third party companies or individuals employed by the company to facilitate the service to provide the website on behalf of the company, to perform services related to the website or to assist the company in analyzing how the website is used.

  • Usage Data refers to data collected automatically, either generated by the use of the website or from the website infrastructure itself (for example, the duration of a page visit).

  • Website refers to Valor Technologies LLC, accessible from

  • You means the individual accessing or using the website, or the company, or other legal entity on behalf of which such individual is accessing or using the website, as applicable.


Security Overview:
Security, privacy, and regulatory compliance are top priorities for Valor Technologies. As a Managed Security Services Provider, we have a deep understanding of the critical role we play in our customers’ businesses. For this reason, we are fully committed to protecting all the data and assets our valued clients trust us with, minimizing the risk of data breaches, and ensuring appropriate use of data.

We use a variety of industry-standard technologies to secure both our and customer data and prevent unauthorized access, disclosure, and use. Additionally, all Valor Technologies employees pass a pre-employment background check, and complete regular security training. For those of us in the security business, we know this is the most important part of any security strategy. Our security efforts are prioritized and executed by our dedicated NOC & SOC teams, ensuring security and availability.

Vulnerability Disclosure:
​If you believe you have found a security vulnerability in any product or service Valor Technologies provides, please contact us as soon as possible. You may send an email directly to or open a support ticket. In either case, our security team will review the issue and provide a first response within 24 hours.


To help facilitate timely verification and resolution, include as much information as possible with vulnerability reports. Valor Technologies will reach out directly, whenever necessary, to investigate the issue further, and to provide status updates.

Infrastructure and Network Security:
Like many Service providers, Valor Technologies infrastructure is hosted in both a private Tier 3 Datacenter and in the cloud with Microsoft (Azure). We are hosted in the US Central Region with Azure and our Tier 3 datacenter where all data flows into and out of and we are backed up between zones and data centers. Both our Data Center and Microsoft provides a strong foundation of privacy and security guarantees. Leveraging both technologies and locations for all infrastructure allows Valor Technologies to stay focused on a relatively small surface of potential security vulnerabilities.


​Physical Access Control:

Valor Technologies does not have physical access to the Azure data center. 
For further details regarding Microsoft’s Datacenter security protocols, refer to Data Center Controls. For further details regarding Microsoft’s Cloud Security Protocols, refer to Azure Infrastructure Security.  

For our Tier 3 Datacenter we have a very limited and controlled access for a very select group of engineers. 
Logical Access Control & Perimeter Security:

Valor Technologies has measures in place to address user access to digital resources based on identity
and authorization of the personnel. This ensures that only authorized individuals can access specific data
or perform certain actions on Valor Technologies platforms. This logical access control is done through
the use of these key principles:

1. Authentication: Valor Technologies uses several techniques for verifying a user’s identity,
including 2FA and MFA. Strong password policies are in place and biometrics are used for data
center access.
2. Authorization: Once a user is authenticated, specific privileges are granted based on their role
and responsibilities at Valor Technologies, including what the user can access and modify on
3. Least Privilege Principle: Users at Valor Technologies are only provided the access necessary
to perform their job duties, limiting unauthorized access to systems.
4. Role Based Access Control (RBAC): RBAC determines permissions based on user roles,
simplifying access management and improving Valor Technologies’ security front.
5. Session Management: Valor Technologies ensures that user sessions are properly managed
and ended after a time of inactivity to aid in the prevention of unauthorized access by anyone who
may get physical access to a device that is already logged in.


Perimeter Security:
Valor Technologies protects the outer boundaries of their network and applications to prevent
unauthorized access to internal systems and sensitive data. These controls are done through the use of
these components:

1. Firewalls: Firewalls are in place at Valor Technologies to act as the first line of defense against
unauthorized access by filtering network traffic on predefined rules. This helps ensure that Valor
Technologies blocks malicious traffic and unauthorized connections.
2. VPN: Valor Technologies uses VPNs to create secure, encrypted connections to their network for
authorized users, protecting sensitive data during remote access transmissions.
3. Denial-of-Service (DoS) Protection: Valor Technologies implements DoS protection measures
to defend against attacks attempting to overwhelm network traffic, keeping the network available
to legitimate users.
4. Network Segmentation: Valor Technologies uses network segmentation to divide the network
into smaller isolated segments that have different security levels to contain potential breaches
and minimize the attack surface to malicious


Penetration Testing:
To independently validate software and infrastructure security, Valor Technologies conducts annual third-party penetration testing. We use the results of these tests to help reveal and prioritize potential security enhancements.


Data Security & Privacy:

Understanding Data Flow & Encryption:
Customer & Vendor data is pulled into Valor Technologies at regular intervals through on-premise Agents and over web APIs. In both cases, data is always transferred using industry standard Transport Layer Security (TLS) over the HTTPS protocol.

Any and All web application traffic to and from Valor Technologies supports and requires HTTPS. Any insecure HTTP requests are automatically redirected to the secure HTTPS protocol. For the small subset of data served directly from Microsoft Azure services, data is always transmitted over HTTPS. Valor Technologies’ latest SSL Labs Report can be found here. Emails delivered to customers by Valor Technologies are encrypted in-transit using TLS whenever supported by the recipient. Valor Technologies has also enabled full disk encryption for our databases.

Internal Policies:

Valor Technologies believes that robust security begins with strong internal security policies. In this spirit, we have developed policies that require full disk encryption for all hardware, strong credentials and 2FA for access to sensitive third-party services, and regular access key and password rotation.

To ensure compliance, our NOC/SOC team provides training (after onboarding and on an ongoing basis) and performs regular random audits. Beyond the internal security policies mentioned above, this includes: acceptable use policy, data use policy, privacy risk assessment, and incident response policy.

To review any of these policies in more detail, please email


Background Checks:

Valor Technologies conducts background checks for all new hires, which includes identity verification and national criminal record lookups.

Disclosure Policy:

Extensive security monitoring mechanisms have been deployed throughout Valor Technologies. In the event a breach or other security incident is identified, we will follow our internal Information Security Incident Response Policy, and will communicate as quickly as possible to any affected customers via email, sharing periodic updates addressing impact and remediation.

Business Continuity & Disaster Recovery:
Hosting in a redundant Tier 3 Datacenter and in the cloud with Azure provides built-in resiliency and failover mechanisms. The application and data processing is distributed dynamically over a fleet of redundant servers, and mission-critical infrastructure advantage of automated backup and multiple availability zone failover mechanisms.


As a safeguard against software and infrastructure failures, Valor Technologies backs up applications and servers nightly, and stores copies of these backups for up to 7 days. Restores from any of these backups can be completed within a matter of hours.

Collecting and Using Your Personal Data

Types of Data Collected

Personal Data:

While using our website, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited to:

  • Email address

  • First name and last name

  • Phone number

  • Address, State, Province, ZIP/Postal code, City

  • Usage Data


Usage data is collected automatically when using the website. Usage data may include information such as your device’s Internet Protocol address (IP address), browser type, browser version, the pages of our website that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

When you access the website by or through a mobile device, we may collect certain information automatically, including, but not limited to, the type of mobile device you use, your mobile device unique ID, the IP address of your mobile device, your mobile operating system, the type of mobile Internet browser you use, unique device identifiers and other diagnostic data. We may also collect information that your browser sends whenever you visit our website or when you access the website by or through a mobile device.

Tracking Technologies and Cookies

We use cookies and similar tracking technologies to track the activity on our website and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze our website. The technologies we use may include:


  • Cookies or Browser Cookies. A cookie is a small file placed on your device. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some parts of our website. Unless you have adjusted your browser setting so that it will refuse cookies, our website may use cookies.

  • Web Beacons. Certain sections of our website and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of a certain section and verifying system and server integrity).

Cookies can be “Persistent” or “Session” cookies. Persistent cookies remain on your personal computer or mobile device when you go offline, while session cookies are deleted as soon as you close your web browser. Learn more about cookies on the Privacy Policies website article.

We use both session and persistent cookies for the purposes set out below:

Necessary/Essential Cookies:

Type: Session Cookies administered by us.

Purpose: These cookies are essential to provide you with services available through the website and to enable you to use some of its features. They help to authenticate users and prevent fraudulent use of user accounts. Without these cookies, the websites that you have asked for cannot be provided, and we only use these cookies to provide you with those services.

Cookies Policy/Notice Acceptance Cookies:

Type: Persistent Cookies administered by us.

Purpose: These cookies identify if users have accepted the use of cookies on the website.

Functionality Cookies:

Type: Persistent Cookies administered by us.

Purpose: These cookies allow us to remember choices you make when you use the website, such as remembering your login details or language preference. The purpose of these cookies is to provide you with a more personal experience and to avoid you having to re-enter your preferences every time you use the website.

Tracking and Performance Cookies:

Type: Persistent Cookies administered by Third Parties.

Purpose: These cookies are used to track information about website traffic and how users use the website. The information gathered via these cookies may directly or indirectly identify you as an individual visitor. This is because the information collected is typically linked to a pseudonymous identifier associated with the device you use to access the website. We may also use these cookies to test new pages, features or new functionality of the website to see how our users react to them.

Use of Your Personal Data:
Valor Technologies may use personal data for the following purposes:

  • To provide and maintain our website, including to monitor the usage of our website.

  • To manage Your Account: to manage your registration as a user of the website. The personal data you provide can give you access to different functionalities of the website that are available to you as a registered user.

  • For the performance of a contract: the development, compliance and undertaking of the purchase contract for the products, items, or services you have purchased or of any other contract with us through the website.

  • To contact You: To contact you by email, telephone calls, SMS, or other equivalent forms of electronic communication, such as a mobile application’s push notifications regarding updates or informative communications related to the functionalities, products, or contracted services, including the security updates, when necessary or reasonable for their implementation.

  • To provide you with news, special offers and general information about other goods, services, and events which we offer that are similar to those that you have already purchased or inquired about unless you have opted not to receive such information.

  • To manage your requests: To attend to and manage your requests to us.

  • For business transfers: We may use your information to evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal data held by us about website users is among transferred assets.

  • For other purposes: We may use your information for other purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns and to evaluate and improve our website, products, services, marketing, and your experience.

We may share your personal information in the following situations:

  • With website providers to monitor and analyze the use of our website, to contact you.

  • In connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.

  • With our affiliates, in which case we will require those affiliates to honor this Privacy Policy. Affiliates include our parent company and subsidiaries, joint venture partners or other companies that we control or that are under common control with us.

  • With our business partners to offer you certain products, services, or promotions.

  • When you share personal information or otherwise interact in the public areas with other users, such information may be viewed by all users and may be publicly distributed outside.

  • We may disclose your personal information for any other purpose with your consent

Retention of Your Personal Data:

Valor Technologies will retain your personal data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use your personal data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies.

Valor Technologies will also retain usage data for internal analysis purposes. Usage data is generally retained for a shorter time period, except when this data is used to strengthen our website security or functionality, or we are legally obligated to retain this data for longer time periods.

Transfer of Your Personal Data:
Your information, including personal data, is processed at the company’s operating offices and in any other places where the parties involved in the processing are located. It means that this information may be transferred to — and maintained on — computers located outside of your state, province, country, or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction. Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

Valor Technologies will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your personal data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Disclosure of Your Personal Data

Business Transactions:

If Valor Technologies is involved in a merger, acquisition or asset sale, your personal data may be transferred. We will provide notice before your personal data is transferred and becomes subject to a different Privacy Policy.

Law enforcement:

Under certain circumstances, the company may be required to disclose your personal data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).

Other legal requirements:

The company may disclose your personal data in the good faith belief that the action is needed to:

  • Comply with any legal obligation

  • Protect and defend the rights or property of the company

  • Prevent or investigate possible wrongdoing in connection with the website

  • Protect the personal safety of users of the website or the public

  • Protect against legal liability

For more information about the cookies we use and your choices regarding cookies, please visit our Cookies Policy or the Cookies section of our Privacy Policy.


Security of Your Personal Data:
The security of your personal data is important to us but no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your personal data, we can’t guarantee its absolute security.

Detailed Information on the Processing of Your Personal Data:
The website providers we use may have access to your personal data. These third party vendors collect, store, use, process and transfer information about your activity on our website in accordance with their Privacy Policies.


We may use third party website providers to monitor and analyze the use of our website.

Google Analytics:

Google Analytics is a web analytics website offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our website. This data is shared with other Google websites. Google may use the collected data to contextualize and personalize the ads of its own advertising network.

You can opt-out of having your activity on the website available to Google Analytics by installing the Google Analytics opt-out browser add-on. The add-on prevents the Google Analytics JavaScript (ga.js, analytics.js and dc.js) from sharing information with them about visits activity.

For more information on the privacy practices of Google, please visit the Google Privacy & Terms web page:

Email Marketing:
We may use your personal data to contact you with newsletters, marketing or promotional materials and other information that may be of interest to you. You may opt-out of receiving any, or all, of these communications from us by following the unsubscribe link or instructions provided in any email we send or by contacting us.

We may use email marketing website providers to manage and send emails to you.


Hubspot: Their Privacy Policy can be viewed at

Usage, Performance and Miscellaneous:
We may use third party website providers tohelp improve our website.

Invisible reCAPTCHA: We use an invisible captcha website operated by Google. The reCAPTCHA website may collect information from you and from your device for security purposes. The information gathered by reCAPTCHA is held in accordance with the Privacy Policy of Google:

CCPA Privacy:
This privacy notice section for California residents supplements the information contained in our Privacy Policy and it applies solely to all visitors and users who reside in the State of California.

Categories of Personal Information Collected:
We collect information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device. The following is a list of categories of personal information which we may collect or may have been collected from California residents within the last twelve (12) months.

Please note that the categories and examples provided in the list below are those defined in the CCPA. This does not mean that all examples of that category of personal information were in fact collected by us but reflects our good faith belief to the best of our knowledge that some of that information from the applicable category may be and may have been collected. For example, certain categories of personal information would only be collected if you provided such personal information directly to us.

Category A: Identifiers.

Examples: A real name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, driver’s license number, passport number, or other similar identifiers.

Collected: Yes.

Category B: Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)).

Examples: A name, signature, Social Security number, physical characteristic or description, address, telephone number, passport number, driver’s license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information. Some personal information included in this category may overlap with other categories.

Collected: Yes.

Category C: Protected classification characteristics under California or federal law.

Examples: Age (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information).

Collected: No.

Category D: Commercial information.

Examples: Records and history of products or services purchased or considered.

Collected: No.

Category E: Biometric information.

Examples: Genetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data.

Collected: No.

Category F: Internet or other similar network activity.

Examples: Interaction with our website or advertisement.

Collected: Yes.

Category G: Geolocation data.

Examples: Approximate physical location.

Collected: No.

Category H: Sensory data.

Examples: Audio, electronic, visual, thermal, olfactory, or similar information.

Collected: No.

Category I: Professional or employment-related information.

Examples: Current or past job history or performance evaluations.

Collected: No.

Category J: Non-public education information (per the Family Educational Rights and Privacy Act (20 USC Section 1232g, 34 CFR Part 99)).

Examples: Education records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, identification codes, financial information, or disciplinary records.

Collected: No.

Category K: Inferences drawn from other personal information.

Examples: Profile reflecting a person’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes.

Collected: No.

Under CCPA, personal information does not include:

  • Publicly available information from government records

  • De-identified or aggregated consumer information

  • Information excluded from the CCPA’s scope, such as:

Health or medical information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the California Confidentiality of Medical Information Act (CMIA) or clinical trial data

Personal information covered by certain sector-specific privacy laws, including the Fair Credit Reporting Act (FCRA), the Gramm-Leach-Bliley Act (GLBA) or California Financial Information Privacy Act (FIPA), and the Driver’s Privacy Protection Act of 1994

Sources of Personal Information:
We obtain the categories of personal information listed above from the following sources:


  • Directly from you. For example, from the forms you complete on our website, preferences you express or provide through our website.

  • Indirectly from you. For example, from observing your activity on our website.

  • Automatically from you. For example, through cookies we or our website providers set on your device as you navigate through our website.

  • From Website Providers. For example, third party vendors to monitor and analyze the use of our website, or other third party vendors that we use to provide the website to you.


Use of Personal Information for Business Purposes or Commercial Purposes:
We may use or disclose personal information we collect for “business purposes” or “commercial purposes” (as defined under the CCPA), which may include the following examples:


  • To operate and provide you with our website.

  • To provide you with support and to respond to your inquiries, including to investigate and address your concerns and monitor and improve our website.

  • To fulfill or meet the reason you provided the information. For example, if you share your contact information to ask a question about our services, we will use that personal information to respond to your inquiry.

  • To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.

  • As described to you when collecting your personal information or as set forth in the CCPA.

For internal administrative and auditing purposes.


  • To detect security incidents and protect against malicious, deceptive, fraudulent, or illegal activity, including, when necessary, to prosecute those responsible for such activities.

Please note that the examples provided above are illustrative and not intended to be exhaustive. For more details on how we use this information, refer to the “Use of Your Personal Data” section.

If we collect additional categories of personal information or use the personal information we collected for materially different, or unrelated purposes, we will update this Privacy Policy.

Disclosure of Personal Information for Business Purposes or Commercial Purposes:

We may use or disclose, and may have used or disclosed in the last twelve (12) months, the following categories of personal information for business or commercial purposes:


  • Category A: Identifiers.

  • Category B: Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)).

  • Category F: Internet or other similar network activity.


Please note that the categories listed above are those defined in the CCPA. This does not mean that all examples of that category of personal information were in fact disclosed but reflects our good faith belief to the best of our knowledge that some of that information from the applicable category may be and may have been disclosed.

When we disclose personal information for a business purpose or a commercial purpose, we enter a contract that describes the purpose and requires the recipient to keep that personal information confidential and not use it for any purpose except performing the contract.

Sale of Personal Information:

As defined in the CCPA, “sell” and “sale” mean selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating orally, in writing, or by electronic or other means, a consumer’s personal information by the business to a third party for valuable consideration. This means that we may have received some kind of benefit in return for sharing personal information, but not necessarily a monetary benefit.

Please note that the categories listed below are those defined in the CCPA. This does not mean that all examples of that category of personal information were in fact sold but reflects our good faith belief to the best of our knowledge that some of that information from the applicable category may be and may have been shared for value in return.

We may sell and may have sold in the last twelve (12) months the following categories of personal information:


  • Category A: Identifiers.

  • Category B: Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)).

  • Category F: Internet or other similar network activity.

Share of Personal Information:
We may share your personal information identified in the above categories with the following categories of third parties:


  • Website providers

  • Our affiliates

  • Our business partners

  • Third party vendors to whom you or your agents authorize us to disclose your personal information in connection with products or websites we provide to you.

Sale of Personal Information of Minors Under 16 Years of Age:

We do not knowingly collect personal information from minors under the age of 16 through our website, although certain third party websites that we link to may do so. These third party websites have their own terms of use and privacy policies and we encourage parents and legal guardians to monitor their children’s Internet usage and instruct their children to never provide information on other websites without their permission.

We do not sell the personal information of consumers we actually know are less than 16 years of age, unless we receive affirmative authorization (the “right to opt-in”) from either the consumer who is between 13 and 16 years of age, or the parent or guardian of a consumer less than 13 years of age. Consumers who opt-in to the sale of personal information may opt-out of future sales at any time. To exercise the right to opt-out, you (or your authorized representative) may submit a request by contacting us.

If you have reason to believe that a child under the age of 13 (or 16) has provided us with personal information, please contact us with sufficient detail to enable us to delete that information.

Your Rights under the CCPA:

The CCPA provides California residents with specific rights regarding their personal information. If you are a resident of California, you have the following rights:


  • The right to notice. You have the right to be notified which categories of personal data are being collected and the purposes for which the personal data is being used.

  • The right to request. Under CCPA, you have the right to request that we disclose information to you about our collection, use, sale, disclosure for business purposes and share of personal information. Once we receive and confirm your request, we will disclose to you:

  • The categories of personal information we collected about you.

  • The categories of sources for the personal information we collected about you.

  • Our business or commercial purpose for collecting or selling that personal information.

  • The categories of third parties with whom we share that personal information.

  • The specific pieces of personal information we collected about you.

  • If we sold your personal information or disclosed your personal information for a business purpose, we will disclose to you:

  • The categories of personal information categories sold

  • The categories of personal information categories disclosed

  • The right to say no to the sale of Personal Data (opt-out). You have the right to direct us to not sell your personal information. To submit an opt-out request please contact us.

  • The right to delete Personal Data. You have the right to request the deletion of your personal data, subject to certain exceptions. Once we receive and confirm your request, we will delete (and direct our website providers to delete) your personal information from our records, unless an exception applies. We may deny your deletion request if retaining the information is necessary for us or our website providers to:

  • Complete the transaction for which we collected the personal information, provide a good or service that you requested, take actions reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform our contract with you.

  • Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity, or prosecute those responsible for such activities.

  • Debug products to identify and repair errors that impair existing intended functionality.

  • Exercise free speech, ensure the right of another consumer to exercise their free speech rights, or exercise another right provided for by law.

  • Comply with the California Electronic Communications Privacy Act (Cal. Penal Code § 1546 et. seq.).

  • Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement, if you previously provided informed consent.

  • Enable solely internal uses that are reasonably aligned with consumer expectations based on your relationship with us.

  • Comply with a legal obligation.

  • Make other internal and lawful uses of that information that are compatible with the context in which you provided it.

  • The right not to be discriminated against. You have the right not to be discriminated against for exercising any of your consumer’s rights, including by:

  • Denying goods or services to you.

  • Charging different prices or rates for goods or services, including the use of discounts or other benefits or imposing penalties.

  • Providing a different level or quality of goods or services to you.

  • Suggesting that you will receive a different price or rate for goods or services, or a different level or quality of goods or services.

Exercising Your CCPA Data Protection Rights:
In order to exercise any of your rights under the CCPA, and if you are a California resident, you can contact us:

By visiting this page on our website:

By phone number: 414-410-9440

Your request to us must:

  • Provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative.

  • Describe your request with sufficient detail that allows us to properly understand, evaluate, and respond to it.

We cannot respond to your request or provide you with the required information if we cannot verify your identity or authority to make the request, and confirm that the personal information relates to you.

We will disclose and deliver the required information free of charge within 45 days of receiving your verifiable request. The time period to provide the required information may be extended once by an additional 45 days when reasonably necessary and with prior notice. Any disclosures we provide will only cover the 12-month period preceding the verifiable request’s receipt.

For data portability requests, we will select a format to provide your personal information that is readily usable and should allow you to transmit the information from one entity to another entity without hindrance.

Do Not Sell My Personal Information:
You have the right to opt-out of the sale of your personal information. Once we receive and confirm a verifiable consumer request from you, we will stop selling your personal information. To exercise your right to opt-out, please contact us.

The website providers we partner with (for example, our analytics or advertising partners) may use technology on the website that sells personal information as defined by the CCPA law. If you wish to opt out of the use of your personal information for interest-based advertising purposes and these potential sales as defined under CCPA law, you may do so by following the instructions below.

Please note that any opt out is specific to the browser you use. You may need to opt out on every browser that you use.


You can opt out of receiving ads that are personalized as served by our website providers by following our instructions presented on the website:

The NAI’s opt-out platform:
The EDAA’s opt-out platform
The DAA’s opt-out platform:

The opt out will place a cookie on your computer that is unique to the browser you use to opt out. If you change browsers or delete the cookies saved by your browser, you will need to opt out again.

Mobile Devices:

Your mobile device may give you the ability to opt out of the use of information about the apps you use in order to serve you ads that are targeted to your interests:


  • “Opt out of Interest-Based Ads” or “Opt out of Ads Personalization” on Android devices

  • “Limit Ad Tracking” on iOS devices

You can also stop the collection of location information from your mobile device by changing the preferences on your mobile device.

“Do Not Track” Policy as Required by California Online Privacy Protection Act (CalOPPA):
Our website does not respond to Do Not Track signals. However, some third party websites do keep track of your browsing activities. If you are visiting such websites, you can set your preferences in your web browser to inform websites that you do not want to be tracked. You can enable or disable DNT by visiting the preferences or settings page of your web browser.

Children’s Privacy:
Our website does not address anyone under the age of 13. We do not knowingly collect personally identifiable information from anyone under the age of 13. If you are a parent or guardian and you are aware that your child has provided us with personal data, please contact us. If we become aware that we have collected personal data from anyone under the age of 13 without verification of parental consent, we take steps to remove that information from our servers.

If we need to rely on consent as a legal basis for processing your information and your country requires consent from a parent, we may require your parent’s consent before we collect and use that information.

Your California Privacy Rights (California’s Shine the Light law)
Under California Civil Code Section 1798 (California’s Shine the Light law), California residents with an established business relationship with us can request information once a year about sharing their personal data with third parties for the third parties’ direct marketing purposes.

If you’d like to request more information under the California Shine the Light law, and if you are a California resident, you can contact us using the contact information provided below.

California Privacy Rights for Minor Users:

(California Business and Professions Code Section 22581)
California Business and Professions Code Section 22581 allows California residents under the age of 18 who are registered users of online sites, services or applications to request and obtain removal of content or information they have publicly posted.

To request removal of such data, and if you are a California resident, you can contact us using the contact information provided below and include the email address associated with your account. Be aware that your request does not guarantee complete removal of content or information posted online and that the law may not permit or require removal in certain circumstances.

Links to Other Websites:
Our website may contain links to other websites that are not operated by us. If you click on a third party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit. We have no control over and assume no responsibility for the content, privacy policies, or practices of any third party websites or services.

Changes to this Privacy Policy:
We may update our Privacy Policy from time to time and we will post the new Privacy Policy on this page. We will let you know via a prominent notice on our website prior to the change becoming effective and update the “Last updated” date at the top of this Privacy Policy.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us:
If you have any questions about this Privacy Policy, you can contact us:

By visiting this page on our website:

By phone number: 414-410-9440

Date of last update: 8/15/2023

  • Facebook
  • Instagram
  • LinkedIn
  • YouTube
  • Discord
bottom of page