Privacy policy

Privacy Policy

Effective Date: February 1, 2021 This privacy notice discloses the privacy practices for this website (renmarinc.com) of Renmar DME Inc.. We are committed to ensuring that your privacy is protected and any information that you provide when using this website is in accordance with this privacy policy. Outlined in this privacy policy explains what information we collect, how we protect any information you submit to us, and how we use it. We may amend this policy by updating this page. Therefore, we suggest you check this page occasionally to ensure you are aware of any changes and amendments.

Use of Information & Sharing

We use information collected to analyze statistics and trends while improving overall experience. Data gathered may be used to provide personally relevant features, customized search results, tailored advertising, and other marketing efforts. No personal information you provide will be shared to a third-party unless otherwise given consent. Any information you share publicly may be indexed by search engines including Google. Information and data shared may include:

  • Third-Party Consent. User provided consent such as signing up for our E-Mail Newsletter.

  • Domain Administrators & Marketing. Marketing firm processing of information and compiling data and analytics.

  • Company Processing & Handling. Internal and external company processing and handling of generated data and analytics.

  • Legal Reasons. May be used in a restricted manner for company integrity while protecting user information and data.

Information Collected

Renmar DME Inc. is the sole owner of the information collected on this site. Only information collected is what you voluntarily give us via email or other direct contact from you. We do not sell or rent this information.

  • Log Data. When you use or interact our Website, our servers record certain information that is automatically reported by your browser (such as Google’s Chrome, Mozilla’s Firefox, or Apple’s Safari) or mobile/tablet device. Each time you make a request to access the Website we are recording log data that may include your IP address, browser settings, device information, referring page and URL, along with the date and time of your request. We may also collect data from emails sent to our users to help us track which emails are opened and which links are clicked.

  • Device Information. In addition to log data, we may collect certain information about the device you’re using to access the Website. This may vary depending on if you are using a PC, Mac, or mobile device such as an iPhone or Android phone. Device information includes hardware model, operating system, and device identifiers.

  • Location Information. The Website may collect information about your approximate or precise location. A variety of technologies may be used to collect location information, including IP address, GPS, and other ways that may provide information on nearby devices, Wi-Fi access, and cell towers.

  • Cookie Data & Similar Technologies. Our website may use cookies, pixel tags, software development kits, statistical identifiers or similar technologies such as Google Analytics. A cookie is data stored on a visitor’s hard drive to improve your access to our site and identify repeat visitors. For instance, when we use a cookie to identify you, you would not have re-enter data more than once, thereby saving time while on our site. Cookies also enable us to track and target the interests of our users to enhance the users experience on our site.

  • Google Analytics. Google Analytics is used on our site, it is a web analytics service provided by Google. Google Analytics uses cookies and similar technologies to collect and analyze data about the performance of our Website. Click here for more information on Google Analytics. To opt-out of having your information collected and used as described, please use the opt-out available here.

Information Security

Our website resides on a network monitored 24/7/365 using the latest technology and are continually updated to meet the latest standards in security. There are several levels of security within our network framework, which are protected by both hardware and software firewalls. Our servers are setup to continually run system scans for Viruses and Malware. We have monitors setup to alert us of any suspicious activity and any downtime that may occur. All information provided is protected and secured giving our users the safest web experience when visiting our website. With sensitive information submitted via the website, your information is protected both online and offline. With collected sensitive information (such as credit card data), that information is encrypted and securely transmitted to us. We secure online connections with cryptography and Secure Sockets Layer (SSL) protocol. This is easily verified by looking for a lock icon in the address bar and looking for “HTTPs” at the beginning of the web address. We take precautions to protect your information. Encryption is used to protect sensitive information transmitted online and offline. The only employees who need this information are those that perform a specific job (for example, billing) and can access to personally identifiable information. Our servers and computers (where personally identifiable information is stored) are kept in a secure environment. You can also set up your browser to block all cookies, including cookies related to our services, or to indicate when a cookie is being set. It’s important to note that many of our services may not function properly if cookies are disabled.

Web Visitor Responsibilities

While we constantly evaluate and implement the latest improvements in Internet security technology, visitors also have responsibility for the security of their information. Some basic recommendations are listed below:

  • Migrate to a modern operating system (OS) and hardware platform. Many of these security features are enabled by default and help prevent many common attack vectors. In addition, implementing the 64-bit mode of the OS on a 64-bit hardware platform substantially increases the effort of an adversary to attain a system or root compromise. For any Windows-based OS, verify that Windows Update is configured to provide updates automatically.

  • Utilize the latest version of a browser. The major browsers are: Microsoft Edge, Google Chrome, Mozilla Firefox, and Safari.

  • Be sure others are not watching you enter information on the keyboard when using the system.

  • Click Exit when you are finished using the system to properly end your session. Once a session has been ended, no further transactions can be processed until you log on to the system again.

  • Close your browser when you are finished. This will prevent other individuals from viewing any account information displayed on your computer.

  • Keep your computer free of viruses and spyware. Use virus and spyware protection software and keep it current. Routinely check on the integrity of your computer.

External Links

Links to other sites are on this website. We are not responsible for the content or privacy practices on other sites. Please be aware when they leave our site and read the privacy statements of any other site that collects personally identifiable information.

Contact Us

If you have questions, concerns, or feel that we are not abiding by this privacy policy, you should contact us by submitting us a message or send an email to inquiries@renmarinc.com. Any questions you have we can be reached by telephone at 603.225.0180.