I. INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks.
Personal Information includes, but is not limited to, name, gender, age, marital status, immigration status, immigration related documents, country of origin, nationality, information related to government-issued papers, educational and working experience, past and present address, telephone and fax number, IRS documents, email address etc.
1. Information collected via Technology
To activate the Service you do not need to submit any Personal Information other than your email address. To use the Service thereafter, you do not need to submit further Personal Information. However, in an effort to improve the quality of the Service, we track information provided to us by your browser or by our mobile application when you view or use the Service, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you. We track this information using cookies, or small text files which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis.
The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser.
2. Information you provide us by registering for an account
II. HOW WE USE AND SHARE INFORMATION
1. Personal Information:
2. Non-Personal Information
3. Sharing with third parties
A. Sharing with registered agent: If you authorize the Company to designate a third party as the registered agent for your business entity, the Company may provide your Non-personal and Personal Information to that party.
B. Sharing with service providers: We may share your Non-personal and Personal Information with companies that provide support services to us (such as a printer or email service provider), help us market our products and services, or for training purposes. These companies may need information about you in order to perform their functions. These companies are not authorized to use the information we share with them for any other purpose.
C. Sharing with attorneys: With your informed and express consent, we may, only to the extent that it is necessary, share your Non-personal and Personal Information, with an attorney who will provide consultation and in some cases, legal services to you. Please be advised that such attorney is not an agent or employee of the Company. Although you may have other rights and privileges with respect to your communication with such attorney (for instance, the attorney-client privilege), the Company is not responsible for any breach or violation thereof.
D. Sharing due to merger, acquisition and other corporate reorganization: If the Company is merged, acquired, or sold, or if some or all of our assets or equity are transferred, the Company may disclose or transfer Personal and Non-personal Information in connection with such transaction.
III. HOW WE PROTECT INFORMATION
We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
IV. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
V. LINKS TO OTHER WEBSITES
VII. CONTACT US