Privacy Policy
Last updated: 4/17/2022
We value the privacy of individuals who visit our website and use our services. In order to provide our services, we need to collect certain pieces of information. This Privacy Policy is intended to help you understand what information we collect, why we collect it, and how you can control your information. You may contact us at [email protected] if you have any questions.
Section 1: Who we are and scope of this Privacy Policy
Big Data 934 (“Big Data 934, LLC”, “we”, “our”, and/or “us”) is a US company located in Michigan. We value your privacy and have developed this policy to cover the usage of bigdata934.com and related communications.
Section 2: Information that we collect and process
Information directly provided by you to us.
If you contact us, you provide us with various pieces of information, such as your name, email address, contact message. As you are completing courses, we record the status of the progress and any responses submitted.
Information collected when using our websites and interact with us.
Like most websites, when you use our websites, we, and our trusted service providers (including our website hosts, analytics providers, advertising partners, and integrated social media services) gather various pieces of information, including via cookies and related technologies. Cookies are small files on your computer and are important to how our sites function and our ability to motor usage. If you interact with services such as social media (for example ‘liking’ or ‘sharing’ our page on social media), the associated partner will collect additional information associated with the interaction (for example, recording the like or share on their service).
Section 3: Why we collect and process the information
We collect information for four primary reasons:
- To provide the services request to you
- To improve and tailor our services
- Based on our legitimate business interests
- As necessary for record-keeping, legal reasons, and compliance
3.i) To provide the services request to you
When you provide information to us, we use that information to provide the services requested. For example, if you contact us or subscribe to our mailing list, we use the information that you provide to respond to your request or deliver our newsletter. Similarly, if you submit questions as part of the courses, we may use this information to respond to your questions.
3.ii) To improve and tailor our services
Website: We use the information collected to improve our service. For example, statistics collected as you browse our website are used to help improve page content and identify technical issues.
Contact with us: We use feedback and inquiries to improve our website, services, and support and tailor our offerings with you. For example, if you inquire about a particular feature, we may use this information to help our development or to keep you updated with improvements.
3.iii) Based on our legitimate business interests
Some of the information processed is based on our legitimate business interests.
3.iv) As necessary for record-keeping, legal reasons, compliance, and security
Information is collected as is necessary to satisfy our various record-keeping, legal, compliance and and security obligations and to maintain the security and availability of our services.
Section 4: How we keep your information secure
We take the security of your information seriously and have put in place various practices to protect your data. These include partnering with trusted-organizations who have large experience in securing specific material; restricting internal access and training; physical and digital security.
Data security: We have in place a variety of security layers, including two-factor authentication, firewalls, and encryption as appropriate. Our service providers are also selected based on their experience and data security procedures.
Restricted access and training: We provide internal training to all employees who have access to any personal information. This covers training on this privacy policy, as well as physical security practices.