Effective Date: 15 March 2013
ResearchTies, LLC respects the privacy of every individual who visits our website. This privacy statement provides notice of the standards and terms under which ResearchTies protects the privacy of information supplied by users of sites that are owned and operated by ResearchTies. This privacy statement provides notice of our information collection practices and of the ways in which your information may be used. This policy may change from time to time, so please check back periodically to review this information.
ResearchTies typically receives specific data about its website users only when such information is provided voluntarily, such as when our users purchase or enroll for services. These activities require that you give us information, such as when you make a purchase or use a credit card to pay for services. When you provide personally-identifiable information to ResearchTies through our website, it will be used to fulfill your specific request. In most cases, you will be given the opportunity to select whether you do, or do not, want ResearchTies to use this information for additional purposes. You may also request that ResearchTies not use your information by sending an e-mail to email@example.com; however, ResearchTies reserves the right, in its discretion, to send you bulletins and other important information about your ResearchTies services. Absent any instructions from you, ResearchTies may use information you provide to inform you about additional services and products offered by ResearchTies and other goods and services providers with whom ResearchTies has relationships and whose offerings might be of interest to you. ResearchTies will not, however, sell or trade your personally-identifiable information unless we are authorized or legally required to do so, or in the case of imminent physical harm to the user or others. On the ResearchTies site where you may provide ResearchTies with credit card or other ordering information via the web, ResearchTies protects and secures this information by employing commercially customary web-based security and encryption protocols.