- What information we collect, store and use.
- How we use that information.
- How we protect that information.
- Information you provide. We collect, store, and use information you provide to us when you register with our services, order products or services from us or respond to a survey from us and additional information you provide to us. For example, when you order our products or services, you may provide us with your name, phone number, email address, financial information, requested products and services, delivery locations and other information. You are always free not to provide information to us, but then you might not be able to take full advantage of our services.
- Information we obtain from your use of our website or services.
- General. We also collect, store, and use information that is available to us as a result of your use of our website and/or our products and services, such as the volume of our products and services that you purchase and the frequency with which you purchase them. In addition, we automatically collect other information such as your IP (Internet Protocol) address, browser types, operating systems and URL addresses of sites clicked to and from our website.
- Location Based Information. When you use a location-enabled service such as one of our mobile applications, we may collect, store, and use information about your actual location, like GPS signals sent by a mobile device. Your location data will be used in connection with providing the products or services you have ordered from us. We periodically delete your location data from our system after it is no longer needed. We also may receive updated information from our haulers or other trusted sources which we use to update our records and provide our products and services to you. Such updated information may include delivery and address information, electronic signatures, delivery confirmation status and GPS coordinates.
- Provide products and services. We use the information we collect from you to provide our products and services to you, to improve our products and services, to develop new products and services and to protect NWA Restore It and our other customers. For example, we use information regarding your location to make deliveries of our products to you.
- Improve customer experience. We use the information we collect from you using cookies and similar technologies to recognize you when you return to our website, to aid you in using our website and to improve your customer experience with us and the overall quality of our services to you.
- Notification of improvements. We may use your email address and other contact information to let you know about additions, changes or improvements to our product and services offerings.
- Special offers. We may use your email address and other contact information to send your special offers from time to time, unless you “opt out” of receiving such offers at registration or request to “unsubscribe” within the offer. In addition, we may send you special offers from other companies. Again, you may “opt out” of these other offers.
- Affiliates and trusted businesses. We may share certain of the information we collect from you with our affiliates and other trusted businesses and individuals we have engaged to perform a service or function on our behalf. Examples include deliveries, sending email and evaluating site usage data.
- Business transfers. In the unlikely event that we are acquired or sell our assets, customer information such as the information we collect from you may be one of the business assets transferred to the successor company or purchaser.
- Law enforcement. If we receive a lawful court order to release account or other personal information, then we will release information to comply with the law. We also will release information when we determine it is necessary to protect the life, safety or property of others. This includes exchanging information with other companies and organizations for fraud protection and credit risk reduction.
- Non–personal information. We may share aggregated, non-personally identifiable information publicly or with third parties.
- Working to protect the security of all information transmitted during transactions by using secure sockets layer (SSL) software, which encrypts all information transmitted.
- Using firewalls designed to protect against unauthorized intrusion.