If you have an unresolved privacy or data use concern that we have not addressed satisfactorily, please contact our U.S.-based third party dispute resolution provider, (free of charge) at feedback-form.truste.com/watchdog/request. To view more details regarding certification, please visit the validation page by clicking on the seal below:
You may browse our Sites without creating an online account, but to use certain features you or your ISO may be required to create an account. When you create an account with us, we may collect your name, email address, contact information, a username and password that you will use to access your account and other information. In addition, to submit a question, comment, or post to a blog, you may be required to submit your name and email address, and we may also ask you for other optional information, such as your business’s website address.
We also collect information from you if you log into our Sites through an account created with a third-party website (e.g. Facebook, or LinkedIn). The option to access our Sites via these third-party websites may occur and will be entirely at your option. The information we are able to migrate to our Sites from these third-party websites will depend on the privacy settings that you have in place with the third-party site from which you log in. If you choose to log into the Sites via a third-party website, you hereby consent to our access to and collection of such Personal Information about you. We also collect the following types of Personal Information through the Sites:
We may also append to the Personal Information collected through our Sites data or an ISO’s new or other data that we receive from other sources, such as public records, demographic information, and other background information supplied by information services or third parties. Examples of the types of Personal Information that may be obtained from other sources may include:
In addition, we automatically collect through our Sites information that is often not personally identifying, such as the website from which you came to our Sites and your IP address, browser type, Internet service provider (ISP), referring/exit pages, the files viewed on our site (e.g., HTML pages, graphics, etc.), operating system, date/time stamp, and/or clickstream data, and other information relating to the device through which you access the Sites. We may combine this information with the Personal Information we have collected from you, which we store in log files. We do this to improve services we offer you.
Some information collected from you is required and some is optional; some will remain private and some will be shared with third parties. Additional information may be gathered during your subsequent use of the Sites, whenever you choose to provide it. Certain Personal Information must be supplied to determine eligibility for financial products and to verify and guard against potential fraud. We will use this information to request a credit report from a credit bureau to process your application as well as to help assess your funding request in the context of your overall financial situation. We will also use your required and optional information to facilitate activities and transactions that need to occur during the funding process.
Additional Uses of Personal Information We use the Personal Information you provide us and allow us access as described herein for the following purposes:
Upon request we will provide you with information about whether we hold any of your personal information. If your personal information changes, or if you no longer want updates or to be contacted for new products, you may correct, update, amend, delete/remove or deactivate your contact information by emailing our Customer Support at firstname.lastname@example.org or by contacting us by telephone or postal mail at the contact information listed below. We will respond to your request within a reasonable timeframe.
We will retain your information for as long as your account is active or as needed to provide you services. In additional we are required to keep, retain your information as necessary to comply with our legal obligations, resolve disputes, and enforce agreements.
We partner with third parties to either display advertising on our Web sites or to manage our advertising on other sites. Our third party partners may use technologies such as cookies to gather information about your activities on the sites and other sites in order to provide you advertising based upon your browsing activities and interests. If you wish to not have this information used for the purpose of serving you interest-based ads, you may opt-out by clicking here. Please note this does not opt you out of
being served ads; you will continue to receive generic ads.
We display personal testimonials of satisfied customers on our sites in addition to other endorsements. With your consent we may post your testimonial along with your name. If you wish to update or delete your testimonial, you can contact us at email@example.com
We may send you emails from time-to-time about information that we (or third parties) believe may be of interest to you. We may also send you news and offers from us or other third parties, which may include our newsletter or information about special offers, products or offerings, or other items. If, at any time, you would like to stop receiving these promotional e-mails, you may follow the opt-out instructions contained in any such e-mail.
Please note that it may take up to 10 business days for us to process opt-out requests. If you opt-out of receiving emails or promotions from us, we still may send you e-mails about your account, your application or any products or services you have requested or received from us, or for other customer service purposes. You do not have an option to opt out of these emails, which are not promotional in nature.
We take reasonable steps to safeguard your personal and sensitive information through vigorous physical, electronic, and operational policies and practices. Data can only be read or written through defined service access points, the use of which is password-protected. The physical security of the data is achieved through a combination of network firewalls (there is no direct communication allowed between the database server and the Internet) and servers with operating systems, all housed in a secure facility. Access to the system is controlled.
Further, we also equip our servers with Secure Socket Layer (SSL) certificate technology to ensure that when you connect you are actually on our Sites. SSL also ensures that all data entered into the web sites is encrypted. To verify that SSL is being used, look for the key or padlock icon on your browser. For further encryption protection, we use a 128-bit secure browser for logins and transactions. Portions of our sites may make use of “CAPTCHA” technology, which is a test that we use to ensure certain sensitive transactions are being initiated by a human and not by another computer. The test involves viewing a distorted image of a word that a computer would not be able to interpret and then entering in the text shown in the image. Finally, we subject our systems to periodic security audits to ensure that your information is thoroughly protected and secure.
No method of transmission over the Internet, or method of electronic storage, is 100% secure, however. Therefore, we cannot guarantee its absolute security. If you have any questions about security on our Web sites, you can contact us at firstname.lastname@example.org.
We store all sensitive financial data such as social security numbers and bank accounts in a secure environment.
When we contact you about your account or to confirm a funds transfer, we only reference the last four digits of your social security number; this is done for your protection.
Your password is not known to any employee or third party with whom we may partner, and we will never ask for your password as a means of identifying yourself. You should never share your password with anyone, and if you ever receive an email purporting to come from us that asks for your password, you should immediately report this development to us at email@example.com.
In addition to our own substantial efforts, you can take several precautions to protect the security of your computer and Personal Information. For instance, you can start by using a complex/well-chosen password. You should avoid using any information that others can easily learn about you, such as a family member’s name or birthday; you can also use special characters in place of letters. We also recommend that you change your password frequently. You can also install and regularly update antivirus and firewall software to protect your computer or device from external attacks by malicious users. When you are finished with a session on our sites, be sure that you log out and close the browser window.
If you use a computer that is accessed by other people, such as in a public library or Internet cafe, we recommend that you take special precautions to protect the security of your account and personal data. When you are finished using our sites, you should log out completely, then close the browser window and clear the browser’s cache files.
You should also be aware of fraudulent attempts to gain access to your account information known as “phishing.” Phishing is a tactic used by scammers in which unsuspecting people are brought to a website by a genuine-looking email purporting to be from a legitimate company. The phony or “spoof” email takes the person to a website that looks legitimate but in fact is not. Either in the email itself or on this fake site, scammers will ask for login information to gain access to people’s accounts and withdraw their money. We will never ask you for your login information in the context of any email. In general, you can protect yourself against phishing by never providing personal or login information via an email, instead, go the web site directly. You might also make it a habit to check the URL of a web site to be sure that it contains the correct domain. You should always ensure the URL contains the domain skybridgebusinessfunding.com at the beginning of the URL.
We also employ session time-outs to protect your account. You will be logged out of the Sites automatically after a specified period of inactivity. This time-out feature reduces the risk of others being able to access your account if you leave your computer unattended.