Summit IT
Summit IT
  • Home
  • Services
    • Cloud Solutions
    • Data Protection
    • IT Managed Services
    • Network Services
  • Resources
    • About
    • Contact
    • Privacy
    • IT Resources
  • More
    • Home
    • Services
      • Cloud Solutions
      • Data Protection
      • IT Managed Services
      • Network Services
    • Resources
      • About
      • Contact
      • Privacy
      • IT Resources
  • Home
  • Services
    • Cloud Solutions
    • Data Protection
    • IT Managed Services
    • Network Services
  • Resources
    • About
    • Contact
    • Privacy
    • IT Resources

Privacy

Protecting Your Personal Information

Our privacy policy explains how we handle your Personally Identifiable Information (PII) online. PII includes data that can identify or locate an individual. Please read it carefully to understand our practices.

What Personal Information Do We Collect?

We collect personal contact information from site visitors, including names, addresses, phone numbers, and email addresses. Additionally, we may collect credit card details for online transactions.


Summit IT will collect information from you when you register on our site, place an order, subscribe to a newsletter, respond to a survey, fill out a form, use live chat, open a support ticket, or enter information on our site.

How Do We Use Your Information?

We use the information collected from you for the following purposes:

  1. Personalizing your experience and delivering relevant content and product offerings.
  2. Improving our website to better serve you.
  3. Enhancing customer service by responding to your requests.
  4. Administering contests, promotions, and surveys.
  5. Efficiently processing transactions.
  6. Requesting ratings and reviews for services or products.
  7. Following up after correspondence via live chat, email, or phone.

How Do We Protect Your Information?

Regular Scanning for Security Holes and Vulnerabilities:

  • The website undergoes regular scans to identify security weaknesses and known vulnerabilities.
  • The goal is to enhance visitor safety by addressing potential risks.

Protection of Personal Information:

  • User data, including personal information, is stored securely.
  • Access to this data is restricted to authorized personnel with special access rights.
  • Confidentiality measures are in place to prevent unauthorized access.

Encryption of Sensitive Information:

  • Sensitive data (such as credit card details) is encrypted using Secure Socket Layer (SSL) technology.
  • This ensures that information transmitted between the user’s browser and the website remains confidential.

Transaction Processing:

  • All transactions occur through a gateway provider.
  • The website itself does not store or process transaction data.
  • This minimizes the risk of data exposure.


In summary, the website prioritizes security by scanning for vulnerabilities, safeguarding personal information, and using encryption for sensitive data. Additionally, transaction processing occurs externally to maintain security

Do We Use Cookies?

Yes. Cookies are small files that websites or service providers transfer to your computer’s hard drive via your web browser (if you allow). These files enable the site’s or service provider’s systems to recognize your browser and capture specific information. For example, cookies help us remember and process items in your shopping cart. They also allow us to understand your preferences based on previous or current site activity, which in turn helps us provide improved services. Additionally, cookies help compile aggregate data about site traffic and interactions, allowing us to enhance site experiences and tools in the future. We may use trusted third-party services to track this information on our behalf. If you prefer, you can configure your browser settings to receive warnings when cookies are being sent or to disable cookies altogether. Keep in mind that some site features may not work properly if you choose to disable cookies.

Third Party Disclosure and Links

We do not sell, trade, or otherwise transfer your Personally Identifiable Information to outside parties without providing advance notice to users. Exceptions include website hosting partners and other parties who assist us in operating our website, conducting business, or serving users, provided they agree to keep this information confidential. We may release information when it’s necessary to comply with the law, enforce site policies, or protect rights, property, or safety. Non-personally identifiable visitor information may be shared with other parties for marketing or advertising purposes. Occasionally, we may include third-party products or services on our website, each with separate and independent privacy policies. While we strive to protect our site’s integrity, we welcome feedback about linked sites. Additionally, we use Google AdSense Advertising, and Google serves ads based on users’ previous visits to our site and other sites on the Internet. We also utilize first-party and third-party cookies for data compilation related to user interactions with ad impressions and other ad service functions, as part of our Demographics and Interests Reporting.

Fair Information Practices

The Fair Information Practice Principles (FIPPs) serve as the foundation for privacy laws and policies applicable to Federal agencies in the United States. These principles have also influenced data protection laws globally. Understanding the FIPPs is crucial for compliance with privacy regulations that safeguard personal information. In the event of a data breach, our responsive action will involve notifying users through in-site notifications within 7 business days. Additionally, we adhere to the Individual Redress Principle, which grants individuals the right to legally pursue enforceable rights against data collectors and processors who violate privacy laws. This principle ensures that individuals can seek recourse through courts or government agencies if data processors fail to comply.

Contacting Us

If there are any questions regarding this privacy policy, you may contact us. 

Contact Us

Copyright © 2025 - Summit IT Systems LLC - All Rights Reserved

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept