- What personally identifiable information is collected from you through the web site, how it is used and with whom it may be shared.
- What choices are available to you regarding the use of data.
- The security procedures in place to protect you from the misuse of information.
- How to correct any inaccuracies in the information.
Information Collection, Use, and Sharing
Guardian Asset Management (“GAM” or “Company” or “We” or “Us”) is the sole owner of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.
We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request.
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
- See what data we have about you, if any.
- Change/correct any data we have about you.
- Have us delete any data we have about you.
- Express any concern you have about our use of your data.
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for “https” at the beginning of the address of the web page.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.
In order to register as a vendor for GAM, a user must first complete the registration form. During registration a user is required to give certain information (such as name and email address). This information is used to contact you about the services on our site in which you have expressed interest. At your option, you may also provide demographic information (such as gender or age) about yourself, but it is not required.
We may use “cookies” on this site. A cookie is a piece of data stored on a site visitor’s hard drive to help us improve your access to our site and identify repeat visitors to our site. For instance, when we use a cookie to identify you, you would not have to log in a password more than once, thereby saving time while on our site. Cookies can also enable us to track and target the interests of our users to enhance the experience on our site.
Usage of a cookie is in no way linked to any personally identifiable information on our site.
This web site may contain links to other sites. Please be aware that we are not responsible for the content or privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of any other site that collects personally identifiable information.
Guardian Asset Management has developed a training seminar that will be conducted once annually to ensure that all of our employees are up to date on our IT Policies and Procedures. Guardian employees are required to attend and sign an attendance sheet. Below is an outline of the curriculum for the seminar.
Guardian’s IT Policies and Procedures:
Updates are conveyed to the employee’s via the Intranet and/or email. It is up to the employee to read and understand these policies. Questions must be directed to IT or HR personnel.
Policies and Procedures
Security PnP: User IT Security outline links to individual policies. Also contains operating standards. Below are a list of Policies and Procedures to be addressed during the seminar:
- Acceptable Use
- Internet Usage
- Email Usage
- Remote Access
- Clean Desk
- Building Security
- IT Support
- Privacy Statement
Question and Answer Session
The seminar will end with a question and answer session. This time will be used to answer employee questions and to help clarify any items discussed.