Privacy Policy

Last updated: April 17, 2020

Affinity Technology (“us”, “we”, or “our”) operates https://atechaz.com (the “Site”). This page informs you of our policies regarding the collection, use and disclosure of Personal Information we receive from users of the Site.

By using the Site, you agree to the collection and use of information in accordance with this policy.

Information Collection and Use

While using our Site, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited to your name, telephone number and email address (“Personal Information”).

We use your Personal Information for the sole purpose of providing our outsourced IT services to you and we will never share your Personal Information with any third parties.

How Long We Retain Your Data

If you leave a comment on the Site, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

When you complete contact forms on our website, we store the Personal Information you provide in a user profile indefinitely. Website administrators can see and edit that information.

Log Data

Like many site operators, we collect information that your browser sends whenever you visit our Site (“Log Data”).

This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser type, browser version, the pages of our Site that you visit, the time and date of your visit, the time spent on those pages and other statistics.

In addition, we may use third party services such as Google Analytics that collect, monitor and analyze this data.

Communications
We may use your Personal Information to contact you with newsletters, marketing or promotional materials and other information that helps us deliver our IT solutions to you.
Cookies

Cookies are files with small amount of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive.

Like many sites, we use “cookies” to collect information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Site.

Security

The security of your Personal Information is extremely important to us. All information used by the Company is collected, stored, maintained and used in accordance with applicable law, guidelines and industry standards. While we utilize every measure available to protect your Personal Information, we cannot guarantee its absolute security.

Changes to This

Privacy Policy

This Privacy Policy is effective as of April 17, 2020 and will remain in effect except with respect to any changes in its provisions in the future, which will be in effect immediately after being posted on this page.

We reserve the right to update or change our Privacy Policy at any time and you should check this Privacy Policy periodically. Your continued use of the Site after we post any modifications to the Privacy Policy on this page will constitute your acknowledgment of the modifications and your consent to abide and be bound by the modified Privacy Policy.

If we make any material changes to this Privacy Policy, we will notify you either through the email address you have provided us, or by placing a prominent notice on our website.

Contact Us
If you have any questions about this Privacy Policy, please contact us.
Why Affinity?

Click below to find out what we do differently that can help you succeed and grow your business. 

Questions? Want to schedule your Network Assessment? Contact us Today.
Recent CASE STUDIES
A Solid Foundation for New Product Development and Growth

A Solid Foundation for New Product Development and Growth

A strong technical backbone was critical to meet this software developer’s new product and growth goals. ieLinks’ Director of Technology Operations Rishi Syed shares his expertise and why they chose Affinity for their network infrastructure and administration needs.

Recent ARTICLES
Is Your Business Safe from Cyber Attacks?

Is Your Business Safe From Cyber Attacks?

Data breaches and costly scams are making headlines, as well as millions of dollars for hackers. Read “A Phishing Story”, learn about six of today’s common types of cyber attacks, and what you and your employees can do to protect your network and your valuable data.

Creating Secure Passwords

How to Manage Your Passwords

Best practices for creating and storing passwords is a fluid situation since companies face new threats on a regular basis. What is today’s advice for balancing convenience and security when managing your passwords?

Backup

Best Practices for Backing Up Your Business Data

Most of us have lost personal data and know how frustrating it is. When it comes to the workplace, data loss can be catastrophic—even halting operations or bringing your businesses to bankruptcy. We recommend these steps for backing up your data.