Privacy Policy For PCC Secure

At PCC Secure Website, accessible from https://pccsecure.com/, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by PCC Secure Website and how we use it.

If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us.

This Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in PCC Secure Website. This policy is not applicable to any information collected offline or via channels other than this website.

Consent

By using our website, you hereby consent to our Privacy Policy and agree to its terms.

Information We Collect

The personal information that you are asked to provide, and the reasons why you are asked to provide it, will be made clear to you at the point we ask you to provide your personal information.

If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide.

When you register for an Account, we may ask for your contact information, including items such as name, company name, address, email address, and telephone number.

How We Use Your Information

We use the information we collect in various ways, including to:

  • Provide, operate, and maintain our website
  • Improve, personalize, and expand our website
  • Understand and analyze how you use our website
  • Develop new products, services, features, and functionality
  • Communicate with you, either directly or through one of our partners, including for customer service, to provide you with updates and other information relating to the website, and for marketing and promotional purposes
  • Send you emails
  • Find and prevent fraud

Log Files

PCC Secure Website follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services’ analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users’ movement on the website, and gathering demographic information.

Cookies And Web Beacons

Like any other website, PCC Secure Website uses ‘cookies’. These cookies are used to store information including visitors’ preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users’ experience by customizing our web page content based on visitors’ browser type and/or other information.

Advertising Partners Privacy Policies

You may consult this list to find the Privacy Policy for each of the advertising partners of PCC Secure Website.

Third-party ad servers or ad networks uses technologies like cookies, JavaScript, or Web Beacons that are used in their respective advertisements and links that appear on PCC Secure Website, which are sent directly to users’ browser. They automatically receive your IP address when this occurs. These technologies are used to measure the effectiveness of their advertising campaigns and/or to personalize the advertising content that you see on websites that you visit.

Note that PCC Secure Website has no access to or control over these cookies that are used by third-party advertisers.

Third Party Privacy Policies

PCC Secure Website’s Privacy Policy does not apply to other advertisers or websites. Thus, we are advising you to consult the respective Privacy Policies of these third-party ad servers for more detailed information. It may include their practices and instructions about how to opt-out of certain options.

You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers’ respective websites.

CCPA Privacy Rights (Do Not Sell My Personal Information)

Under the CCPA, among other rights, California consumers have the right to:

Request that a business that collects a consumer’s personal data disclose the categories and specific pieces of personal data that a business has collected about consumers.

Request that a business delete any personal data about the consumer that a business has collected.

Request that a business that sells a consumer’s personal data, not sell the consumer’s personal data.

If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.

GDPR Data Protection Rights

We would like to make sure you are fully aware of all of your data protection rights. Every user is entitled to the following:

The right to access – You have the right to request copies of your personal data. We may charge you a small fee for this service.

The right to rectification – You have the right to request that we correct any information you believe is inaccurate. You also have the right to request that we complete the information you believe is incomplete.

The right to erasure – You have the right to request that we erase your personal data, under certain conditions.

The right to restrict processing – You have the right to request that we restrict the processing of your personal data, under certain conditions.

The right to object to processing – You have the right to object to our processing of your personal data, under certain conditions.

The right to data portability – You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions.

If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.

Children’s Information

Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.

PCC Secure Website does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.

Secure Your Organization's Future with PCC Secure's Threat Assessment Group Program

Do these pain points keep you up at night?

Signs of potential violence

Grievances against your organization or colleagues

Sudden behavior changes

Aggressive behavior

At PCC Secure, we bring together your key corporate stakeholders and our Threat Assessment Group (TAG) Program, facilitated by a dedicated coordinator, to effectively manage cases encountered by the TAG. This program, supported by our esteemed Open-Source Intelligence Center (OSIC) led by former law enforcement and military intelligence analysts, offers unparalleled insights and intelligence.

By combining your corporate leadership with our TAG program, you gain access to unmatched resources and specialized knowledge in identifying, evaluating, and managing potential threats to your organization. Our comprehensive approach ensures that we provide you with the tools and expertise needed to navigate the complex landscape of security risks, offering you the peace of mind you deserve.

Frequently Asked Questions

The Threat Assessment Group Program consists of key corporate stakeholders, such as in-house legal counsel, HR, representatives from IT, physical security, facilities, security, executive management, and a PCC Secure TAG Coordinator. This comprehensive approach ensures both internal and external threats are tackled efficiently and holistically. Through our systematic approach, TAG will help identify early warning signs, assess risks associated with employees at risk of termination or terminated employees, and comprehensively investigate external threats. It collaborates closely with law enforcement agencies, physical security experts, and leverages secure communication channels to proactively respond to exigent events, ensuring fast, efficient, and effective controls are in place.
Based on recommendations from the US Secret Service and the FBI, forming a TAG equips you with the ability to closely monitor and address any warning signs that may indicate a potential for violence. With TAG, your organization gains access to proactive security measures and threat mitigation strategies that attempts to ensure the safety and continuity of your operations.
Our TAG program includes monthly planned meetings, serving as a platform for collaboration between key stakeholders. During these sessions, our TAG Coordinator, alongside in-house legal counsel, HR representatives, and relevant departments such as IT and physical security, actively participate to ensure a holistic approach to threat assessment and risk management. In exigent matters, the team can be brought together quickly to ensure the safety of all workers.
While the ideal company size for forming a threat assessment group may vary, we highly recommend medium to large-sized companies, typically ranging from 100 to 500 employees or more, to establish a specialized team like this. These organizations often face complex structures and operational challenges, making them more susceptible to various types of threats. By partnering with our TAG Program, you gain dedicated resources, expertise, and the ability to proactively identify, evaluate, and respond to potential threats that could compromise the safety and security of your organization.

Your Peace of Mind is Our Priority

Contact us today to learn more about how our Threat Assessment Group Program can partner with your organization to safeguard your employees, ensuring their safety and your peace of mind. Together, we will navigate the uncertainties of the modern world and ensure that your organization’s security remains unrivaled.