Third parties are not permitted to sell the information we provide to them or to disclose it in any other way without your consent.
We use safe, secure technology and other privacy protection programs to keep your information secure. Personally identifiable information is for the most part only shared with third parties in order to complete a transaction or an activity you have initiated on our site. We will not share your personally identifiable information with advertisers. All information you provide us is held in strict confidence. If required to do so by law enforcement, or if we suspect any illegal activity, we may share your information with the proper authorities. Privacy policies contained herein apply to services available under the domain and sub-domains of www.rmtaxseminar.org.
All amended terms shall automatically be effective 10 days after they are initially posted on our site.
All users of this website certify that they are of legal age to do so and this website makes no exceptions to this rule. If you are a minor, you must gain permission from and have an individual who meets minimum legal age requirements access our services in your behalf.
Collection of personal information on this website is related to services provided by the Rocky Mountain Tax Seminar.
We use your credit card information to pay for services provided by the Rocky Mountain Tax Seminar. We may verify your name, address, and other information, as it relates to credit card information you supply to ensure you are the person using the credit card or are a person authorized to do so.
If you enter your credit card information on our website(s):
We collect information that allows us to securely process the transactions you request. We utilize the utmost industry technology to accept, process, and verify credit card payments and to protect our users, as well as ourselves from any fraudulent activity. We verify all information provided and apply advanced technologies to maintain the safety and confidentiality of our processing system. We may collect a billing address, a credit card number and a credit card expiration date and other personal information to process your request(s).
If you send us personal correspondence, such as emails or letters, or if other users or third parties send us correspondence about your activities, we may collect such information into a file specific to you. We use your information to facilitate requests by you. We use information in the file we maintain about you, and other information we obtain is used to improve our services, maintain accurate evaluation and appraisal records, and for general reference and accounting procedures.
If you choose to order services from us, and provide us with your credit card information, we use your address and billing information to bill you and provide associated support. We do not store credit card numbers on our websites in order to protect your personal information therefore, you may be required to enter credit card information each time you request our services.
You agree that we may use personally identifiable information about you to improve our marketing and promotional efforts, to analyze site usage, improve our content and customize our site's content, layout, and services. These uses improve our site and our customers experience when visiting us.
We do cooperate fully with law enforcement inquiries, as well as other third parties to enforce laws, such as: intellectual property rights, fraud and other rights.
We can (and you authorize us to) disclose any information about you to law enforcement or other government officials as we, in our sole discretion, believe necessary or appropriate, in connection with an investigation of fraud, intellectual property infringements, or other activity that is illegal or may expose us or you to legal liability.
We use industry standard practices to safeguard the confidentiality of your personal identifiable information, including "firewalls" and Secure Socket Layers. We utilize many different security techniques to protect data from unauthorized access by users inside and outside the company. However, "perfect security" does not exist on the Internet as we know it today.
We will attempt to respond to your inquiry as quickly as possible.