Privacy Policy 2012-01-05T19:47:01+00:00

Your privacy is critically important to us. At Eagle PC Consulting we have a few fundamental principles:

  • We don’t ask you for personal information unless we truly need it.
  • We don’t share your personal information with anyone except to comply with the law, develop our products, or protect our rights.
  • We don’t store personal information on our servers unless required for the on-going operation of one of our services.

Below is our privacy policy which incorporates these goals: (Note, we’ve decided to make this privacy policy available under a Creative Commons Sharealike license, which means you’re more than welcome to steal it and repurpose it for your own use, just make sure to replace references to us with ones to you, and if you want we’d appreciate a link to Eagle PC Consulting.com somewhere on your site. We spent a lot of money and time on the below, and other people shouldn’t need to do the same.)

If you have questions about deleting or correcting your personal data please contact our support team.

Eagle PC Consulting  (“Eagle PC Consulting”) operates several websites including EaglePCConsulting.com. It is Eagle PC Consulting’s policy to respect your privacy regarding any information we may collect while operating our websites.

Website Visitors

Like most website operators, Eagle PC Consulting collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. Eagle PC Consulting’s purpose in collecting non-personally identifying information is to better understand how Eagle PC Consulting’s visitors use its website. From time to time, Eagle PC Consulting may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.

Eagle PC Consulting also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users. Eagle PC Consulting only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that blog commenter IP addresses are visible and disclosed to the administrators of the blog where the comment was left.

Gathering of Personally-Identifying Information

Certain visitors to Eagle PC Consulting’s websites choose to interact with Eagle PC Consulting in ways that require Eagle PC Consulting to gather personally-identifying information. The amount and type of information that Eagle PC Consulting gathers depends on the nature of the interaction.  In each case, Eagle PC Consulting collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor’s interaction with Eagle PC Consulting. Eagle PC Consulting does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.

Aggregated Statistics

Eagle PC Consulting may collect statistics about the behavior of visitors to its websites. Eagle PC Consulting may display this information publicly or provide it to others. However, Eagle PC Consulting does not disclose personally-identifying information other than as described below.

 Protection of Certain Personally-Identifying Information

Eagle PC Consulting discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on Eagle PC Consulting’s behalf or to provide services available at Eagle PC Consulting’s websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using Eagle PC Consulting’s websites, you consent to the transfer of such information to them. Eagle PC Consulting will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, Eagle PC Consulting discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when Eagle PC Consulting believes in good faith that disclosure is reasonably necessary to protect the property or rights of Eagle PC Consulting, third parties or the public at large. If you are a registered user of an Eagle PC Consulting website and have supplied your email address, Eagle PC Consulting may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with Eagle PC Consulting and our products. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. Eagle PC Consulting takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.

Cookies

A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Eagle PC Consulting uses cookies to help Eagle PC Consulting identify and track visitors, their usage of Eagle PC Consulting website, and their website access preferences. Eagle PC Consulting visitors who do not wish to have cookies placed on their computers should set their browsers to refuse cookies before using Eagle PC Consulting’s websites, with the drawback that certain features of Eagle PC Consulting’s websites may not function properly without the aid of cookies.

Business Transfers

If Eagle PC Consulting, or substantially all of its assets were acquired, or in the unlikely event that Eagle PC Consulting goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of Eagle PC Consulting may continue to use your personal information as set forth in this policy.

Ads

Ads appearing on any of our websites may be delivered to users by advertising partners, who may set cookies. These cookies allow the ad server to recognize your computer each time they send you an online advertisement to compile information about you or others who use your computer. This information allows ad networks to, among other things, deliver targeted advertisements that they believe will be of most interest to you. This Privacy Policy covers the use of cookies by Eagle PC Consulting and does not cover the use of cookies by any advertisers.

Comments

Comments and other content submitted to our Akismet anti-spam service are not saved on our servers unless they were marked as false positives, in which case we store them long enough to use them to improve the service to avoid future false positives.

Privacy Policy Changes

Although most changes are likely to be minor, Eagle PC Consulting may change its Privacy Policy from time to time, and in Eagle PC Consulting’s sole discretion. Eagle PC Consulting encourages visitors to frequently check this page for any changes to its Privacy Policy. If you have a WordPress.com account, you should also check your blog’s dashboard for alerts to these changes. Your continued use of this site after any change in this Privacy Policy will constitute your acceptance of such change.

Experience – Services

  • Business System Analyst

    The position of Business Systems Analyst has always been Dr. Sullivan’s first love in her long career in the IT industry. She began working as a Business Systems Analyst in 1993 and was immediately drawn to the challenge presented by this position. As a Business… Read more…

  • Computer Systems Analyst

    Dr. Sullivan began working as a Computer Systems Analyst in 1990. During the last 17 years, her ability to research a company’s needs and to make the appropriate recommendations for moving forward has reached a high level of expertise. Dr. Sullivan’s meticulous method of examining… Read more…

  • Database Specialist

    In her position of Database Administrator and Database Analyst, Dr. Sullivan uses her knowledge and substantial experience in IT to protect the integrity of each company’s data. Part of her responsibilities includes making the needed data available to the client and the employees. An understanding… Read more…

  • Software Architect

    Dr. Sullivan’s natural inclination toward both the technical and the mechanical workings of computer systems are assets that have served her well since 2008 in her position as Software Architect. Her technical nature partnered with years of study and hands-on experience has allowed her to… Read more…

  • IT Auditor

    In her position of IT Auditor, Dr. Sullivan creates a solid information technology infrastructure while collaborating with clients to devise and implement policies and procedures to ensure network security. Due to the rapidly changing world of IT, keeping her technological skills current is a prime… Read more…

Quality Information Systems (web or software applications) are the backbone of most business operations today (whether client-facing or internal), yet, according to Research studies “one-third of business stakeholders are dissatisfied with the quality of their current information systems.”

A poorly integrated and tested information system severely effects on an organization’s clients, sales, partnerships, employees and financial bottom line.

Security, cloud computing, virtualization, service-oriented architectures, mobile deployments, and ever-changing compliance requirements all strain the performance of information systems and the abilities of IT department or team.