How you are protected
- “Townsend Cole Group”, “we”, “us”, and “our” all refer to Townsend Cole Group.
- “Personal data” refers to any personal data that could be used to identify you, including your name, contact details, taxpayer identification number, Townsend Cole Group account number or account balance, or other online identifiers including your Internet Protocol (IP) address. It does not include data collected which cannot be used to personally identify you, such as anonymous aggregate data.
- “Townsend Cole Group” is defined as a “data controller” that is responsible for determining how your personal data is retained, stored or utilized.
What data we collect and how we use it
The first time you establish contact with Townsend Cole Group via our web site, you are required to provide your name, email address and telephone number. Townsend Cole Group uses this information to record your interest in our service and to provide you with information that you specifically request.
Townsend Cole Group may share this personal information with other departments within the company in order to respond properly to inquiries that are beyond the scope of our initial response team and that must be addressed by another department with greater expertise.
Townsend Cole Group maintains a strict policy of never sharing your personal information with any third party, unless it is otherwise mandatory. For example, we may be required to provide personal information to product providers in order to purchase their products on your behalf.
How we protect your personal information
The internet is not a secure medium. Townsend Cole Group therefore follows “secure computing” practices to ensure that all information provided to us is protected via comprehensive security protocols.
Townsend Cole Group restricts access to your personal information to only those company personnel with a specific professional need who have been specifically authorized. All of our databases are stored on servers with strong firewalls to prevent outside access, and all data is protected utilizing military-grade encryption algorithms.
Consent to use