- Introduction
IPM Integrated Project Management Inc. is committed to protecting your personal information and your right to privacy. If you have any questions or concerns about this privacy notice or our practices with regard to your personal information, please contact the President directly.
- 2. Information We Collect
We collect personal information that you voluntarily provide to us when you work with us or express an interest in obtaining information about us or our products and services, when you participate in activities on the website, or otherwise when you contact us.
- How We Use Your Information
We use personal information collected via various means such as surveys, meetings and documents for a variety of business purposes described below. We process your information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations.
- 4. Sharing Your Information
We comply with OCAP standards and requirements and as such do not share information without your direct request and consent, to comply with laws, to provide you with services, to protect your rights, or to fulfill business obligations.
- Data Security
We take the security of your personal and organizational information very seriously and have implemented a variety of security measures to ensure its protection. These measures include:
- Encryption: All personal data is encrypted both in transit and at rest using industry-standard encryption protocols to prevent unauthorized access.
- Access Controls: We employ strict access controls to ensure that only authorized personnel have access to your data. This includes role-based access controls and multi-factor authentication.
- Regular Audits: We conduct regular security audits and assessments to identify and address potential vulnerabilities in our systems.
- Data Anonymization: Where possible, we anonymize personal data to further protect your privacy.
- Secure Software and Incident Response Plan: We rely heavily on Foundation BTS to ensure that security is considered at every stage of the data development process
- Incident Response Plan: We have a comprehensive incident response plan in place to quickly and effectively address any data breaches or security incidents.
- Employee Training: All employees undergo regular training on data security best practices and are required to adhere to our strict data protection policies.
- Third-Party Security: We ensure that any third-party service providers we work with also adhere to stringent data security standards.
While we strive to protect your personal and/or organizational information, please be aware that no security measures are perfect or impenetrable. We cannot guarantee the absolute security of your data, but we are committed to doing our best to protect it.
- Ownership, Control, Access, and Possession (OCAP)
We adhere to the principles of Ownership, Control, Access, and Possession (OCAP) to ensure that your data is handled with the utmost care and transparency. OCAP allows you to maintain control over your data and provides a framework for secure and efficient data management. You have the right to:
- Ownership: You retain ownership of your personal data at all times. We do not claim any ownership rights over your data.
- Control: You have full control over how your data is used and shared. You can update your preferences and settings at any time.
- Access: You have the right to access your data and request a copy of the information we hold about you.
- Possession: You have the right to possess your data and transfer it to other services or platforms as needed.
- Changes to This Privacy Policy
We may update this privacy notice from time to time in order to reflect, for example, changes to our practices or for other operational, legal, or regulatory reasons.
- Contact Us
If you have questions or comments about this policy, you may email us at info@integrated-pm.ca or by fax: (902) 701-3414.