What personally identifiable information is obtained from you through the website or via email how it is used and with whom it may be shared.
What choices are available to you regarding the use of your data.
The security procedures in place to protect the misuse of your information.
How you can correct any inaccuracies in the information.
Information Collection, Use, and Sharing
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address, or phone number on our website:
• See what data we have about you if any.
• Change/correct any data we have about you.
• Have us delete any data we have about you.
• Express any concern you have about our use of your data.
HTTPS is much more secure than HTTP. When you send sensitive information over an HTTPS/HSTS connection, no one can eavesdrop on it in transit. HTTPS/HSTS is what makes secure online banking and shopping possible. When you connect to an HTTPS-secured server—secure sites like your bank’s will automatically redirect you to HTTPS — your web browser checks the website’s security certificate and verifies that a legitimate certificate authority issued it, while HSTS forces those connections over HTTPS encryption. We use the same technology at National Doorstep. This helps you ensure that, if you see a lock and “https://www.nationaldoorsteppickup.com/” in your web browser’s address bar, you’re securely connected to our real website.
We take further precautions to protect your information. When you submit sensitive information via the website, your information is secured both online and offline. Wherever we collect confidential information (such as Unit Counts or Decision Maker Contact Info.), that information is AES-256 bit encrypted and securely transmitted to us. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, generating a Doorstep Trash Proposal) are granted access to personally identifiable information. We see to it that identifiable information is kept in an AES-256 bit secure environment at rest on the cloud. The Advanced Encryption Standard, AES, has been adopted by the U.S. government and is now used worldwide.