1) INFORMATION COLLECTION AND USE
ITmesh is the sole owner of the information collected through the web site/phone/e-mail. We will not sell or rent this information to others in ways different from what is disclosed in this policy.
a) Personal Information
We will ask you when we need information that personally identifies you (personal information) or allows us to contact you.
b) Payment Information
If user registers to use the Service provided by ITmesh, we will collect credit card information, and other payment information necessary to complete a payment from user. Service Provider may use a third party to process and verify credit cards for billing purposes. This requires us to share user name, credit card number, expiration date and billing address with the credit card processing company. We may transfer or disclose this payment information to a third party only to the extent necessary in order to complete the payment processing.
c) Computer System Information
i) Subscriber Computer -We may also ask for information related to your computer. This may include: information about the date of purchase of your computer, type of computer, identification number of your computer, make and model of your computer and/or any computer hardware, software or peripherals attached to it, condition of the computer, system and registry data about software installations and hardware configurations, and error tracking files. Generally, this information is required to provide personalized technical support to you, and to help us update our support tools and enhance our supported products list.
ii) Remote Access – While requesting support you may request for the problem to be resolved by taking control of your computer. ITmesh uses qualified tools which allow user to grant control of user computer to an Expert remotely over the Internet, so that the Expert can diagnose or correct problems. Experts are not allowed to use the Remote Access software until and unless they have received adequate training in its use, and user have consented to grant control. In addition, Experts will not use Remote Access tools to obtain confidential or sensitive information stored on user computer or network, deliberately destroy information on user computer or network, or cause user to experience system problems.