GDPR Customer Statement
The European Union (E.U.) has introduced the General Data Protection Regulation 2016/679 (“GDPR”), which is a new privacy regulation containing security and privacy requirements to fully protect data belonging to E.U. based individuals.
GDPR was adopted by the European Parliament in April 2016 and goes into effect on May 25, 2018.
GDPR is applicable for companies based in and out of the E.U. where data collection and personal data handling from EU-based individuals is in play. Any information which can be used on its own or with other information to locate, contact or identify a single person such as names, identification numbers, online identifiers, location data, or any other factors specific to the individual’s genetic, physical, mental, physiological, cultural, economic, or social identity is considered to be Personally Identifiable Information (PII).
In order to be in compliance with GDPR, any company handling or collecting PII. I pertaining to EU-based individuals needs to ensure their data management protocol adheres to all requirements detailed within GDPR.
Included in the requirements for GDPR are cross-border data flow mechanisms, technical/operational security measures, notice & consent, accountability and data minimization.
- Security audits: Records of security practices must be maintained by companies and regular audits to assess the effectiveness of the established security program must occur. If any breaches are identified, corrective measures must be taken immediately.
- Data security: It is mandatory that companies put in place strict controls, including physical, technical and administrative. In accordance with GDPR requirements, incident management, data integrity, confidentiality, encryption, availability and resilience are required as part of the security program for any company handling EU-based data. Implemented controls must serve to prevent information leaks, data loss and unauthorized data access.
- Data breach notification: Companies must immediately notify regulators, clients, and any and all impacted individuals once they become aware of a data breach which could potentially impact data controlled or processed by the Company.
As needed, please contact your ISI Language Solutions representative for further clarification.
Disclaimer: This document is not to be used as legal advice about any law or regulation. To understand the GDPR, customers must seek their own legal counsel.
Isilanguagesolutions.com (“Company” or “We“) respects your privacy and is committed to protecting it through our compliance with this policy. This policy describes the types of information we may collect from you or that you may provide when you visit our corporate website, www.isilanguagesolutions.com (our “Website“), and our practices for collecting, using, maintaining, protecting, and disclosing that information. This policy applies to information we collect:
- On our corporate website
- In email, text, and other electronic messages between you and the isilanguagesolutions.com domain
- Through mobile and desktop applications you download from this website, which provide dedicated non-browser-based interaction between you and this website
- When you interact with our advertising and applications on third-party websites and services, if those applications or advertising include links to this policy
- Information you provide to us when requesting services.
It does not apply to information collected by:
- us offline or through any other means, including on any other website operated by Company or any third party; or
- any third party, including through any application or content (including advertising) that may link to or be accessible from or on the website.
Children under the age of 13
Our website is not intended for children under 13 years of age. No one under age 13 may provide any information to or on the website. We do not knowingly collect personal information from children under 13. If you are under 13, do not use or provide any information on this website or on or through any of its features. If we learn we have collected or received personal information from a child under 13 without verification of parental consent, we will delete that information. If you believe we might have any information from or about a child under 13, please contact us at: email@example.com
Information we collect about you and how we collect it
We collect several types of information from and about users of our website, including information:
- by which you may be personally identified, such as name, postal address, email address, telephone number, or any other identifier by which you may be contacted online or offline (“personal information”);
- that is about you but individually does not identify you, such as the languages you speak or can read; and/or
- about your internet connection, the equipment you use to access our website, and usage details.
We collect this information:
- Directly from you when you provide it to us.
- Automatically as you navigate the site, information collected automatically may include usage details, I.P. addresses, and information collected through cookies, web beacons, and other tracking technologies.
- From third parties, for example, our business partners.
Information You Provide to Us. The information we collect on or through our website may include:
- Information that you provide by filling in forms on our website, such as our Contact Form on the corporate website. This includes information provided when registering to use our website or requesting further services such as a quote request or project approval. We may also ask you for information when you report a problem with our website
- Records and copies of your correspondence (including email addresses) if you contact us
- Your responses to surveys that we might ask you to complete for research purposes
- Details of transactions you carry out through our website and details of the fulfillment of your orders, including payment information, as you may be required to provide financial information before placing an order through our website
- Your search queries on the website
You also may provide information to be published or displayed (hereinafter, “posted“) on public areas of the website or transmitted to other users of the Website or third parties (collectively, “User Contributions“). Your User Contributions are posted on and transmitted to others at your own risk. Information We Collect Through Automatic Data Collection Technologies. As you navigate through and interact with our website, we may use automatic data collection technologies to collect certain information, not tied to your user profile on our portal, about your equipment, browsing actions, and patterns, including:
- Details of your visits to our website, including traffic data, location data, logs, and other communication data and the resources that you access and use on the website
- Information about your computer and internet connection, including your I.P. address, operating system, and browser type
We also may use these technologies to collect information about your online activities on our corporate website (www.isilanguagesolutions.com) over time and across third-party websites or other online services (behavioral tracking). You may opt-out of behavioral tracking on this website by responding to the full site takeover when you first land. The information we collect automatically may include personal information that we may maintain or associate with the personal information we collect in other ways or receive from third parties. It helps us to improve our website and to deliver better and more personalized service, including by enabling us to:
- Estimate our audience size and usage patterns.
- Store information about your preferences, allowing us to customize our website according to your individual interests.
- Speed up your searches.
- Recognize you when you return to our website.
The technologies we use for this automatic data collection may include:
- Web Beacons: Pages of our Website and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of certain website content and verifying system and server integrity).
- To present our website and its contents to you
- To provide you with information, products, or services that you request from us.
- To fulfill any other purpose for which you provide it
- To provide you with notices about your account, including expiration and renewal notices
- To carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including for billing and collection
- To notify you about changes to our website or any products or services we offer or provide though it
- To allow you to participate in interactive features on our website
- To deliver our language-based services to you
- In any other way, we may describe when you provide the information
- For any other purpose with your consent
- To comply with any relevant laws, regulations, ordinances, rules, directives, or statutes
If you chose to opt-in to receive marketing materials from us, possibly when you filled our “contact us” form on our corporate website (www.isilanguagesolutions.com), be aware that we may use your information to contact you about our own and third-parties’ goods and services that may be of interest to you. If you do not want us to use your information in this way, please check the relevant box to opt-out located on the “Contact Us” form on our website or at the bottom of any marketing emails you may receive from us. You can also opt-out by sending an email to firstname.lastname@example.org. Legal bases for processing (For EEA users): If you are an individual in the European Economic Area (EEA), we collect and process information about you only where we have a legal basis for doing so under applicable E.U. laws. The legal basis depends on the Services you use and how you use them. This means we collect and use your information only where:
- We need it to provide you with the Services you requested, including to operate the Services, provide customer support and personalized features, and to protect the safety and security of the Services, which includes all processing necessary for the performance of our contract(s) with you;
- It satisfies a legitimate interest that is not outweighed by your data protection rights and interests, such as for research and development, to market and promote the Services and to protect our legal rights and interests;
- You give us consent to do so for a specific purpose; or
- We need to process your data to comply with a legal obligation.
Disclosure of your information
- To our subsidiaries and affiliates
- To contractors, service providers, and other third parties we use to support our business and who are bound by contractual obligations to keep personal information confidential and use it only for the purposes for which we disclose it to them
- To a buyer or other successor in the event of a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of ISI Language Solutions’ assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held by ISI Language Solutions’ about our Website users is among the assets transferred
- To fulfill the purpose for which you provide it. For example, if you give us an email address to use the “email a friend” feature of our website, or copy a coworker on a request being made through our portal, we will transmit the contents of that email/request and possibly your email address to the recipients
- For any other purpose disclosed by us when you provide the information
- With your consent
We may also disclose your personal information:
- To comply with any court order, law, or legal process, including to respond to any government or regulatory request.
- If we believe disclosure is necessary or appropriate to protect the rights, property, or safety of ISI Language Solutions, our customers, or others. This includes exchanging information with other companies and organizations for the purposes of fraud protection and credit risk reduction.
Choices about how we use and disclose your information
We strive to provide you with choices regarding the personal information you provide to us. We have created mechanisms to provide you with the following control over your information:
- Marketing Emails: You can review and change your personal information in our marketing systems by using the unsubscribe function on our marketing emails.
- Promotional Offers from the Company. If you do not wish to have your contact information used by the Company to promote our own, you can opt-out by checking the relevant box located on the form on which we collect your data (the order/registration form) or at any other time by sending us an email stating your request to email@example.com. If we have sent you a promotional email, you may send us a return email asking to be omitted from future email distributions or use the opt-out feature on the email.
Accessing and correcting your information
We do our best to respect your privacy rights and provide you access and control over your data. You may make any of the following requests regarding your data by contacting us at firstname.lastname@example.org:
- Access and review your data.
- Correct your data or request that we delete some or all of it.
- Obtain copies of your data in human or and/or machine-readable format suitable for importing to other software.
- Restrict us from using or processing your data.
Be advised that we use a differential backup system; this means that we cannot delete your specific information from our inactive backups. We cannot delete your personal information except by also deleting your user account. We may not accommodate a request to change or delete information if we believe the change or deletion would violate any law or legal requirement or cause the information to be incorrect. If you delete your User Contributions from the website, copies of your User Contributions may remain viewable in cached and archived pages or might have been copied or stored by other Website users. Proper access and use of information provided on the website, including User Contributions, is governed by our Terms & Conditions.
Your California privacy rights California Civil Code Section § 1798.83 permits users of our website that are California residents to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes. To make such a request, please send an email to email@example.com.
We have implemented measures designed to secure your personal information from accidental loss and from unauthorized access, use, alteration, and disclosure. All information you provide to us is stored on secure servers behind firewalls. Any payment transactions and all sensitive personal data will be encrypted using commercially reasonable technology. We classify your information, but we require your assistance to most capably protect your data. We will ask you to mark data as (1) Unclassified, (2) Confidential, or (3) Sensitive, depending on your classification of any data you submit to us. If you believe that the data you send to us contains personal data or other sensitive information, you must notify us by marking that information as Sensitive. When classifying your data, you should consider the following definitions:
- Confidential data is any proprietary data subject to non-disclosure and confidentiality contract obligations that would cause or create legal liability if accessed by unauthorized parties
- Restricted data is any Personal Data as that term is defined by the European Union’s General Data Protection Regulation and/or any similar laws or regulations, including but not limited to “personally identifiable information”, “private health information”, and/or “non-public information” as such terms are used in HIPAA, PCI-DSS, the Gramm-Leach-Bliley Act, or Sarbanes-Oxley. Sensitive data also includes valuable and proprietary information (including trade secrets), for which the loss, unauthorized access to, or unauthorized publication of would result in substantial or severe harm.
Terms & Conditions
Last Modified: 10/29/2020
Acceptance of the Terms & Conditions
These Terms & Conditions are entered into by and between You and ISI Language Solutions (“Company“, “we” or “us“). The following terms and conditions, together with any documents they expressly incorporate by reference (collectively, these “Terms & Conditions”), govern your access to and use of isilanguagesolutions.com, including any content, functionality, and services offered on or through www.isilanguagesolutions.com (the “Website“), whether as a guest or a registered user. In order to request and obtain our translation and localization services (our “Services”), you must agree to these Terms & Conditions.
This website is offered and available to users who are 18 years of age or older, competent to enter into contracts, and authorized to provide us with all necessary information to perform any Services you request from us. By using this website, you represent and warrant that you are of legal age to form a binding contract with the Company and meet all of the foregoing eligibility requirements. If you do not meet all of these requirements, you must not access or use the website.
Changes to the Terms & Conditions
We may revise and update these Terms & Conditions from time to time in our sole discretion. All changes are effective immediately when we post them and apply to all access to and use of the website thereafter. However, if you have a registered account with us, you will be given an opportunity to stop accessing and using the website if you do not agree to our revisions or updates. Additionally, any changes to the dispute resolution provisions set forth in Governing Law and Jurisdiction will not apply to any disputes for which the parties have actual notice on or prior to the date the change is posted on the website.
Your continued use of the website following the posting of revised Terms & Conditions means that you accept and agree to the changes. You are expected to check this page from time to time so you are aware of any changes, as they are binding on you. However, we will make commercially reasonable efforts to notify you of any material changes if you are a registered user of the website.
Accessing the Website and Account Security
We reserve the right to withdraw or amend this website, and any service or material we provide on the website, in our sole discretion without notice. We will not be liable if for any reason all or any part of the website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the website, or the entire website, to users, including registered users.
You are responsible for:
- Making all arrangements necessary for you to have access to the website
- Ensuring that all persons who access the website through your internet connection are aware of these Terms & Conditions and comply with them
If you choose or are provided with a user name, password, or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information.
We have the right to disable any user name, password, or other identifier, whether chosen by you or provided by us, at any time if, in our opinion, you have violated any provision of these Terms & Conditions.
Intellectual Property Rights
The website and its entire contents, features, and functionality (including but not limited to all information, software, text, displays, images, video and audio, and the design, selection, and arrangement thereof), are owned by the Company, its licensors or other providers of such material and are protected by the United States and international copyright, trademark, patent, trade secret and other intellectual property or proprietary rights laws.
The Company name, the Company logo, and all related names, logos, product and service names, designs, and slogans are trademarks of the Company or its affiliates or licensors. You must not use such marks without the prior written permission of the Company. All other names, logos, product and service names, designs, and slogans on this website are the trademarks of their respective owners.
You may use the website only for lawful purposes and in accordance with these Terms & Conditions. You agree not to use the website:
- In any way that violates any applicable federal, state, local or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the U.S. or other countries)
- For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information or otherwise
- To send, knowingly receive, upload, download, use, or re-use any material which does not comply with the Data Classification & Content Standards set out in these Terms & Conditions.
- To transmit, or procure the sending of, any advertising or promotional material, including any “junk mail”, “chain letter” or “spam” or any other similar solicitation
- To impersonate or attempt to impersonate the Company, a Company employee, another user or any other person or entity (including, without limitation, by using email addresses associated with any of the foregoing)
- To engage in any other conduct that restricts or inhibits anyone’s use or enjoyment of the website or which, as determined by us, may harm the Company or users of the website or expose them to liability.
Additionally, you agree not to:
- Use the website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party’s use of the website, including their ability to engage in real-time activities through the website
- Use any robot, spider, or other automatic device, process, or means to access the website for any purpose, including monitoring or copying any material on the website.
- Use any manual process to monitor or copy any of the material on the website or for any other unauthorized purpose without our prior written consent
- Use any device, software, or routine that interferes with the proper working of the website
- Introduce any viruses, trojan horses, worms, logic bombs, or other material which is malicious or technologically harmful
- Attempt to gain unauthorized access to, interfere with, damage or disrupt any parts of the website, the server on which the website is stored, or any server, computer, or database connected to the website
- Attack the website via a denial-of-service attack or a distributed denial-of-service attack
- Otherwise, attempt to interfere with the proper working of the website
The website includes access to your customer portal, which contains chat functionality, file upload and download systems, and access to our Services, and may include other interactive features (collectively, “Interactive Services“) that allow users to post, submit, publish, display or transmit to other users or other persons (hereinafter, “post“) content or materials (collectively, “User Data“) on or through the website, including User Data you ask us to translate or localize.
All User Data must comply with the Data Classification & Content Standards set out in these Terms & Conditions.
Any User Contribution you post to the site will be considered non-confidential and non-proprietary unless you properly comply with the Data Classification & Consent Standards set forth below. By providing any User Contribution on the website, you grant us and our affiliates and service providers, and each of their and our respective licensees, successors, and assigns the right to use, reproduce, modify, perform, display, distribute, and otherwise disclose to third parties any such material for the purpose of providing you with any requested Services.
You represent and warrant that:
- You own or control all rights in and to the User Data and have the right to grant the license granted above to ISI Language Solutions, our affiliates, and service providers and us, and each of their and our respective licensees, successors, and assigns
- All of your User Data do and will comply with these Terms & Conditions
You understand and acknowledge that you are responsible for any User Data you submit or contribute. You, not the Company, have full responsibility for such content, including its legality, reliability, accuracy, and appropriateness.
We are not responsible or liable to any third party for the content or accuracy of any User Data posted by you or any other user of the website
Monitoring and Enforcement; Termination
We have the right to:
- Remove or refuse to process any User Data for any or no reason in our sole discretion
- Take any action with respect to any User Contribution that we deem necessary or appropriate in our sole discretion, including if we believe that such User Contribution violates the Terms & Conditions, including the Data Classification & Content Standards, infringes any intellectual property right or other rights of any person or entity, threatens the personal safety of users of the website or the public or could create liability for the Company
- Disclose your identity or other information about you to any third party who claims that material posted by you violates their rights, including their intellectual property rights or their right to privacy.
- Take appropriate legal action, including without limitation, referral to law enforcement, for any illegal or unauthorized use of the website.
- Terminate or suspend your access to all or part of the website for any violation of these Terms & Conditions.
Without limiting the foregoing, we have the right to fully cooperate with any law enforcement authorities or court order requesting or directing us to disclose the identity or other information of anyone posting any materials on or through the website. YOU WAIVE AND HOLD HARMLESS THE COMPANY AND ITS AFFILIATES, LICENSEES AND SERVICE PROVIDERS FROM ANY CLAIMS RESULTING FROM ANY ACTION TAKEN BY ANY OF THE FOREGOING PARTIES DURING OR AS A RESULT OF ITS INVESTIGATIONS AND FROM ANY ACTIONS TAKEN AS A CONSEQUENCE OF INVESTIGATIONS BY EITHER SUCH PARTIES OR LAW ENFORCEMENT AUTHORITIES.
However, we cannot review all material before it is posted on the website and cannot ensure prompt removal of objectionable material after it has been posted. Accordingly, we assume no liability for any action or inaction regarding transmissions, communications, or content provided by any user or third party. We have no liability or responsibility to anyone for performance or nonperformance of the activities described in this section.
Data Classification & Content Standards
These data classification and content standards apply to any and all User Data and use of Interactive Services, including our translation Services. User Data must, in their entirety, comply with all applicable federal, state, local, and international laws and regulations. Without limiting the foregoing, User Data must not:
- Knowingly infringe any patent, trademark, trade secret, copyright or other intellectual property or other rights of any other person
- Promote or constitute any illegal activity, or advocate, promote or assist any unlawful act.
- Give the impression that they emanate from or are endorsed by a third party if this is not the case
- Confidential data is any proprietary or otherwise non-public information subject to non-disclosure and confidentiality contract obligations that would cause or create legal liability if accessed by unauthorized parties. We will treat User Data classified as Confidential as Unrestricted
- Restricted data is any Personal Data as that term is defined by the European Union’s General Data Protection Regulation and/or any similar laws or regulations, including but not limited to “personally identifiable information”, “private health information”, and/or “non-public information” as such terms are used in HIPAA, PCI-DSS, the Gramm-Leach-Bliley Act, or Sarbanes-Oxley. Sensitive data also includes valuable and proprietary information (including trade secrets), for which the loss, unauthorized access to, or unauthorized publication would result in substantial or severe harm. Ultimately, you are responsible for deciding if your data is sensitive or not. We will treat User Data classified as Sensitive as Restricted information.
Your data is processed in our system as either Unrestricted or Restricted, depending on your classification. If you fail to classify your data, we will consider that data Unrestricted. Both Unclassified and Confidential data is Unrestricted. Sensitive data is Restricted. Our secure portal uses commercially reasonable technologies, processes and procedures to maintain the confidentiality, integrity, and availability of all Confidential and Restricted data. While we still make commercially reasonable efforts to protect Unrestricted data, such data is not subject to our most expensive and stringent controls.
You must properly classify your data as required under these Terms & Conditions for us to leverage our technical and organizational measures designed to protect the confidentiality, integrity, and availability of your User Data. If you do not use isilanguagesolutions.com to send us User Data, we make no guarantees or warranties related to the security or safety of such improperly submitted User Data.
Changes to the Website
We may update the content on this website from time to time, but its content is not necessarily complete or up-to-date. Any of the material on the website may be out of date at any given time, and we are under no obligation to update such material.
Information About You and Your Visits to the Website
Linking to the Website and Social Media Features
You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval or endorsement on our part without our express written consent.
This website may provide certain social media features that enable you to:
- Link from your own or certain third-party websites to certain content on this website.
- Send emails or other communications with certain content or links to certain content on this website.
- Cause limited portions of content on this website to be displayed or appear to be displayed on your own or certain third-party websites.
You may use these features solely as they are provided by us, solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not:
- Establish a link from any website that is not owned by you.
- Cause the website or portions of it to be displayed, or appear to be displayed by, for example, framing, deep linking, or in-line linking, on any other site.
- Link to any part of the website other than the homepage.
- Otherwise, take any action with respect to the materials on this website that is inconsistent with any other provision of these Terms & Conditions.
- You agree to cooperate with us in causing any unauthorized framing or linking immediately to cease. We reserve the right to withdraw linking permission without notice.
We may disable all or any social media features and any links at any time without notice at our discretion.
Links from the Website
If the website contains links to other sites and resources provided by third parties, these links are provided for your convenience only. This includes links contained in advertisements, including banner advertisements and sponsored links, if applicable. We have no control over the contents of those sites or resources and accept no responsibility for them or for any loss or damage that may arise from your use of them. If you decide to access any of the third-party websites linked to this website, you do so entirely at your own risk and subject to the terms and conditions of use for such websites.
The owner of the website is based in the state of Florida in the United States. We provide this website for use only by persons located in the United States and any other location where accessing this website is legal. We make no claims that the website or any of its content is accessible or appropriate outside of the United States. Access to the Website may not be legal by certain persons or in certain countries. If you access the website from outside the United States, you do so on your own initiative and are responsible for compliance with local laws, except for laws relating to privacy rights and responsibilities, including the GDPR.
You understand that we cannot and do not guarantee or warrant that files available for downloading from the internet or the website will be free of viruses or other destructive code, except for files that ISI Language Solutions has provided for you to download using our Restricted security option via our portal. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for anti-virus protection and accuracy of data input and output and for maintaining a means external to our site for any reconstruction of any lost data. WE WILL NOT BE LIABLE FOR ANY LOSS OR DAMAGE CAUSED BY A DISTRIBUTED DENIAL-OF-SERVICE ATTACK, VIRUSES OR OTHER TECHNOLOGICALLY HARMFUL MATERIAL THAT MAY INFECT YOUR COMPUTER EQUIPMENT, COMPUTER PROGRAMS, DATA OR OTHER PROPRIETARY MATERIAL DUE TO YOUR USE OF THE WEBSITE OR ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE OR TO YOUR DOWNLOADING OF ANY MATERIAL POSTED ON IT, OR ON ANY WEBSITE LINKED TO IT.
YOUR USE OF THE WEBSITE, ITS CONTENT, AND ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE IS AT YOUR OWN RISK. THE WEBSITE, ITS CONTENT AND ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS, WITHOUT ANY WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED. NEITHER THE COMPANY NOR ANY PERSON ASSOCIATED WITH THE COMPANY MAKES ANY WARRANTY OR REPRESENTATION WITH RESPECT TO THE COMPLETENESS, SECURITY, RELIABILITY, QUALITY, ACCURACY OR AVAILABILITY OF THE WEBSITE. WITHOUT LIMITING THE FOREGOING, NEITHER THE COMPANY NOR ANYONE ASSOCIATED WITH THE COMPANY REPRESENTS OR WARRANTS THAT THE WEBSITE, ITS CONTENT OR ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE WILL BE ACCURATE, RELIABLE, ERROR-FREE OR UNINTERRUPTED, THAT DEFECTS WILL BE CORRECTED, THAT OUR SITE OR THE SERVER THAT MAKES IT AVAILABLE ARE FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS OR THAT THE WEBSITE OR ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE WILL OTHERWISE MEET YOUR NEEDS OR EXPECTATIONS.
THE COMPANY HEREBY DISCLAIMS ALL WARRANTIES OF ANY KIND, WHETHER EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, AND FITNESS FOR PARTICULAR PURPOSE.
THE FOREGOING DOES NOT AFFECT ANY WARRANTIES WHICH CANNOT BE EXCLUDED OR LIMITED UNDER APPLICABLE LAW.
Limitation on Liability
IN NO EVENT WILL THE COMPANY, ITS AFFILIATES OR THEIR LICENSORS, SERVICE PROVIDERS, EMPLOYEES, AGENTS, OFFICERS OR DIRECTORS BE LIABLE FOR DAMAGES OF ANY KIND, UNDER ANY LEGAL THEORY, ARISING OUT OF OR IN CONNECTION WITH YOUR USE, OR INABILITY TO USE, THE WEBSITE, ANY WEBSITES LINKED TO IT, ANY CONTENT ON THE WEBSITE OR SUCH OTHER WEBSITES OR ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE OR SUCH OTHER WEBSITES, INCLUDING ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO, PERSONAL INJURY, PAIN AND SUFFERING, EMOTIONAL DISTRESS, LOSS OF REVENUE, LOSS OF PROFITS, LOSS OF BUSINESS OR ANTICIPATED SAVINGS, LOSS OF USE, LOSS OF GOODWILL, LOSS OF DATA, AND WHETHER CAUSED BY TORT (INCLUDING NEGLIGENCE), BREACH OF CONTRACT OR OTHERWISE, EVEN IF FORESEEABLE.
THE FOREGOING DOES NOT AFFECT ANY LIABILITY WHICH CANNOT BE EXCLUDED OR LIMITED UNDER APPLICABLE LAW.
You agree to defend, indemnify and hold harmless the Company, its affiliates, licensors and service providers, and its and their respective officers, directors, employees, contractors, agents, licensors, suppliers, successors and assigns from and against any claims, liabilities, damages, judgments, awards, losses, costs, expenses or fees (including reasonable attorneys’ fees) arising out of or relating to your violation of these Terms & Conditions or your use of the website, including, but not limited to, your User Data, any use of the website’s content, services and products other than as expressly authorized in these Terms & Conditions or your use of any information obtained from the website.
Governing Law and Jurisdiction
All matters relating to the Website and these Terms & Conditions and any dispute or claim arising therefrom or related thereto (in each case, including non-contractual disputes or claims) shall be governed by and construed in accordance with the internal laws of the State of Georgia without giving effect to any choice or conflict of law provision or rule (whether of the State of Georgia or any other jurisdiction).
Any legal suit, action or proceeding arising out of, or related to, these Terms & Conditions or the website shall be instituted exclusively in the federal courts of the United States or the courts of the State of Georgia in each case located in the City of Atlanta and County of Fulton although we retain the right to bring any suit, action or proceeding against you for breach of these Terms & Conditions in your country of residence or any other relevant country. You waive any and all objections to the exercise of jurisdiction over you by such courts and to venue in such courts.
Waiver and Severability
No waiver of by the Company of any term or condition set forth in these Terms & Conditions shall be deemed a further or continuing waiver of such term or condition or a waiver of any other term or condition, and any failure of the Company to assert a right or provision under these Terms & Conditions shall not constitute a waiver of such right or provision.
If any provision of these Terms & Conditions is held by a court or other tribunal of competent jurisdiction to be invalid, illegal or unenforceable for any reason, such provision shall be eliminated or limited to the minimum extent such that the remaining provisions of the Terms & Conditions will continue in full force and effect.
Your Comments and Concerns
This website is operated by ISI Langauge Solutions, located at 700 N Brand Blvd #950, Glendale, CA 91203
All other feedback, comments, requests for technical support and other communications relating to the website should be directed to: firstname.lastname@example.org.
Information Security Policy (I.S.P.)
According to standard definitions, an Information Security Policy is a set of rules enacted by an organization to ensure that all users or networks of the I.T. structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority. Attaining this goal involves setting up an Information Security Policy for the organization and ensuring its adherence. This policy should cover things like acceptable uses of technology, risk reviews at a senior level, operational security procedures, and other general administrative tasks.
An I.S.P. is governing the protection of information, which is an asset the organization needs to protect. Information may be printed, written, spoken, visually explained. In addition, it can be mailed, sent electronically, visually, or verbally transmitted. Information should be appropriately secured regardless of its nature, transmission, or storage.
The organization has implemented the I.S.P. with the goal of identifying, assessing, and taking steps to avoid or to mitigate risk to ISI Language Solutions information assets. Information security is achieved by implementing a suitable set of controls, including policies, organizational structures, and software and hardware functions. These controls are established, implemented, monitored, and controlled to ensure that the specific security and business objectives of the organization are met. Such is executed in conjunction with the 9001 Quality Management System (Q.M.S.) processes implemented by the organization.
To implement and properly maintain a robust information security function, the organization recognizes the importance of:
- Understanding the information security requirements and the need to establish policy and objectives for information security;
- Understanding, assessing and measuring risks posed to and by ISI Language Solutions’ information assets;
- Implementing and operating controls to manage the organization’s information security risks in the context of overall business risks;
- Ensuring all employees of the organization are aware of their responsibilities in assets protection and security.
- Monitoring and reviewing the performance and effectiveness of information security policies and controls; and
- Continually improving the assessments, measurements, and changes that affect risk.
This policy and all related documentation apply to all information, information systems, networks, applications, locations, and users of ISI Language Solutions or external providers.
4. Roles, Responsibilities, and Authorities
4.1 security organization management
The Management Team, including the V.P. of Technology, have established an 07F18 Security Management Structure document. The Security Management Team has the following responsibilities and authority assigned:
- Review security policies.
- Assign security roles.
- Coordinate and review the implementation of security across the organization.
Information security responsibilities are clearly defined, maintained, and communicated. These responsibilities include the security of ISI Language Solutions information assets and information technology that are accessed, processed, communicated to, or managed by external parties.
4.2 roles and responsibilities
The Information Security Policy has been established, documented, and is maintained with the purpose of continuous improvement and assurance that the organization’s information is secure. Within the Information Security Policy, roles and responsibilities have been defined and assigned to specific individuals or groups within its organization.
Information Security Steering Group (ISSG): Responsible for information security in the organization to reduce risk exposure and ensure the organization’s activities do not introduce undue risk. The group is responsible for ensuring compliance with established security policies, processes and security initiatives, and with state and federal regulations.
Information Security Officer (ISO): Responsible for information security at the business level for reducing risk exposure, drafting policies, and for ensuring the organization’s activities do not introduce undue risk to the enterprise. The ISO is responsible for ensuring compliance and adherence to this policy.
Information Asset Owner (I.A.O.): Responsible for approving decisions regarding controls and access privileges, performing periodic reclassification and ensuring regular reviews for value and updates to manage changes to risk.
User: Responsible for complying with the provisions of policies and procedures.
The table below uses the RACI (R= Responsible A= Accountable C= Consulted I= Informed) model, for identifying roles and responsibilities during an organizational change process
|Area of Responsibility||ISSG||ISO||IAO||User|
|Establish the Information Security Program (ISP)||A||R||C||N/A|
|Implement and Operate the ISP||A||R||C||N/A|
|Monitor and Review the ISP||A/R||R||C||N/A|
|Maintain and Improve the ISP||A/R||R||C||N/A|
|Provision of Resources||A/R||C||I||N/A|
|Training, Awareness and Competence||A/R||R||C||I|
|Internal ISP Audits||A/R||R||C||I|
|Storage of Source Code||N/A||R||N/A||N/A|
Managers: Managers ensure employees are aware of the relevance and importance of their activities and how they contribute to the achievement of information security objectives. They also ensure that
employees are aware of and comply with all information security policies and procedures of the organization relevant to their role.
I.T. Team: The team is responsible of the following areas related to information security:
- Managing related processes, such as incident and change management
- Providing technical expertise related to information security
- Implementing technical controls
- System administration, e.g., user creation, backups
- Security monitoring, e.g., network intrusions
- Reporting actual or potential security breaches
- Contributing to risk assessment where required
5. Identification and Authentication
The organization has defined the expectation and principles relating to how system setup and credential privileges should be managed. User accounts and privileges shall be managed correctly to ensure authorized user access to information systems is possible while unauthorized access is not, such as but not limited to:
- Authorization to manage user accounts and privileges: The H.R. Business Partner triggers the request, authorization may be given through line management, by the Manager and/or Director of the area in question.
- Management of user accounts and privileges: Specific staff is authorized to control login accounts and permissions for systems that the I.T. team does not manage. The I.T. team may delegate specific limited responsibilities for managing accounts and permissions to staff in other departments. See 07F18 Security Management Structurefor more details.
- Users’ access rights must be adjusted in a timely manner to provide only authorized and necessary access. This should take place whenever there is a change in business need, a change in an employee’s role or when an employee leaves the organization.
- Password management. Once access to a system or application is authorized, the user is to be informed of their temporary password in a secure manner. This temporary password must be changed immediately; this should be enforced automatically by the system.See 04M06 Password Policy for more details.
- Deletion of user access upon exiting the organization.
- A monthly audit is conducted of login access to ensure accuracy and remove access to those users which are no longer eligible or required. See07P08 I.T. Service Desk S.O.P. for more details.
6. Handling of Incidents and I.T. Requests
The I.T. Team has established procedures to ensure a consistent and effective approach to the management of information security incidents and I.T. requests, including communication on security events and weaknesses. It enables the efficient and effective management of information security incidents by providing structure for the reporting and management of such incidents.
Information security incidents and I.T. requests shall be reported promptly and responded to in a quick, effective, and orderly manner to reduce the negative effect of incidents, repair damage, and mitigate future risks. Tickets are to be submitted to I.T. Help Desk I.A.W. 07P08 I.T. Service Desk S.O.P.
Weekly reports will be generated by the I.T. Service Desk system for all tickets labeled ‘security’. Trends will be analyzed to determine if any discernible patterns require further investigation.
The I.T. team has daily meetings where, if necessary, post-mortem and trend analysis is discussed. Any serious incidents should be recorded in the Non-Conformance log, and a C.A.R. may be originated I.A.W. 10P01 Corrective Action Request S.O.P., if deemed necessary.
7. Change Management
ISI Language Solutions has deployed a change management process in order to prevent unintended service disruptions and to maintain the integrity of all company services. There is segregation of duties, and all requests go through a workflow process consisting of request, approval, implementation, and review I.A.W. 07P08 I.T. Service Desk S.O.P. Rollback procedures are documented in case there is a need to go back to a previous state, even though change plans are related to minimal marketable features (MMF) most of the time. Layers of authorization and logging exist, so that production changes are controlled and monitored. Only authorized engineers are able to login to central configuration management machines from where production changes can be applied. ISI Language Solutions communicates to different stakeholders when the services might be adversely affected.
8. Risk Management
Risk assessments will identify, quantify, and prioritize threats that may become relevant to the organization. The results will guide and determine appropriate organization action and priorities for managing information security risks and for implementing controls needed to protect information assets.
Risk management will include the following steps:
- Identify the risks
- Identify the organization’s assets and the associated information owners.
- Identify the threats to those assets.
- Identify the vulnerabilities that might be exploited by the threats.
- Identify the impacts that losses of confidentiality, integrity, and availability may have on the assets.
- Analyze and evaluate the risks
- Assess the impacts on the organization that may result from security failures, taking into account the consequences of a loss of confidentiality, integrity, or availability of those assets.
- Assess the risk of security failures occurring due to the vulnerabilities and impacts associated with the assets and the implemented controls.
- Estimate the level of risks.
- Determine whether the risks are acceptable.
- Identify and evaluate options for the treatment of risk
- Apply appropriate controls.
- Accept the risks.
- Avoid the risks.
- Transfer the associated risks to other parties.
- Select control objectives and controls for the treatment of risk
- The organization is committed to continually monitoring, reviewing and analyzing potential risks to ensure requirements are effectively managed in the 05M03 Information Security Policy. Identified risks and opportunities are recorded and managed using the 06F02 Risks and Opportunities Management Document
- The I.T. Help Desk and Non-Conformance log provide visibility into potential risks to the organization as regards the security information and allowing effective, related decision making.
- Threats Related Risk Management
- Risk threats are managed in accordance with established internal policies and procedures. Additional information available under N.D.A.
Details of our selected controls and how they have been implemented and measured are considered confidential information and restricted to ISI Language Solutions The following sections have been removed to make this document available to the public: security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management, business continuity management and compliance.
Isilanguagesolutions.Com Privacy Notice For California Residents
Effective Date: January 1, 2020
Last Reviewed on: January 31, 2020
Information We Collect
Our website collects information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device (“personal information“). In particular, ISI Language Solutions’ Website has collected the following categories of personal information from its consumers within the last twelve (12) months:
|A. Identifiers.||A real name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, Social Security number, driver’s license number, passport number, or other similar identifiers.||YES|
|B. Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)).||A name, signature, Social Security number, physical characteristics or description, address, telephone number, passport number, driver’s license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information.Some personal information included in this category may overlap with other categories.||YES|
|C. Protected classification characteristics under California or federal law.||Age (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information).||NO|
|D. Commercial information.||Records of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies.||YES|
|E. Biometric information.||Genetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data.||NO|
|F. Internet or other similar network activity.||Browsing history, search history, information on a consumer’s interaction with a website, application, or advertisement.||YES|
|G. Geolocation data.||Physical location or movements.||NO|
|H. Sensory data.||Audio, electronic, visual, thermal, olfactory, or similar information.||YES|
|I. Professional or employment-related information.||Current or past job history or performance evaluations.||NO|
|J. Non-public education information (per the Family Educational Rights and Privacy Act (20 U.S.C. Section 1232g, 34 C.F.R. Part 99)).||Education records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, student identification codes, student financial information, or student disciplinary records.||NO|
|K. Inferences drawn from other personal information.||Profile reflecting a person’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes.|
Personal information does not include:
- Publicly available information from government records.
- Deidentified or aggregated consumer information.
- Information excluded from the CCPA’s scope, like:
- health or medical information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the California Confidentiality of Medical Information Act (CMIA) or clinical trial data;
- personal information covered by certain sector-specific privacy laws, including the Fair Credit Reporting Act (FRCA), the Gramm-Leach-Bliley Act (GLBA) or California Financial Information Privacy Act (FIPA), and the Driver’s Privacy Protection Act of 1994.
ISI Language Solutions obtains the categories of personal information listed above from the following categories of sources:
- Directly from you. For example, from forms you complete or products and services you purchase.
- Indirectly from you. For example, from observing your actions on our website.
- Directly from third parties who engage us to provide services. For example, from parties you have interacted with and who may require translation or localization services to conduct their business with you.
Use of Personal Information
We may use or disclose the personal information we collect for one or more of the following business purposes:
- To fulfill or meet the reason you provided the information. For example, if you share your name and contact information to request a price quote or ask a question about our products or services, we will use that personal information to respond to your inquiry. If you provide your personal information to purchase a product or service, we will use that information to process your payment and facilitate delivery. We may also save your information to facilitate new product orders or process returns.
- To provide, support, personalize, and develop our website, products, and services.
- To create, maintain, customize, and secure your account with us.
- To process your requests, purchases, transactions, and payments and prevent transactional fraud.
- To provide you with support and to respond to your inquiries, including to investigate and address your concerns and monitor and improve our responses.
- To personalize your Website experience and to deliver content and product and service offerings relevant to your interests, including targeted offers and ads through our website, third-party sites, and via email or text message (with your consent, where required by law).
- To help maintain the safety, security, and integrity of our website, products and services, databases and other technology assets, and business.
- For testing, research, analysis, and product development, including to develop and improve our website, products, and services.
- To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.
- As described to you when collecting your personal information or as otherwise set forth in the CCPA.
- To evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of ISI Language Solutions’ assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held by ISI Language Solutions about our Website users is among the assets transferred.
ISI Language Solutions will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.
Sharing Personal Information
ISI Language Solutions may disclose your personal information to a third party for a business purpose. When we disclose personal information for a business purpose, we enter a contract that describes the purpose and requires the recipient to both keep that personal information confidential and not use it for any purpose except performing the contract.
We share your personal information with the following categories of third parties:
- Service providers.
- Third-party customers who engage us to provide translation or localization services that may be related to your personal information.
Disclosures of Personal Information for a Business Purpose
In the preceding twelve (12) months, Company has disclosed the following categories of personal information for a business purpose:
Category A: Identifiers.
Category B: California Customer Records personal information categories.
Category C: Protected classification characteristics under California or federal law.
Category D: Commercial information.
Category F: Internet or other similar network activity.
Category H: Sensory data.
Category K: Inferences drawn from other personal information.
We disclose your personal information for a business purpose to the following categories of third parties:
- Service providers.
- Third-party customers who engage us to provide translation or localization services that may be related to your personal information.
Sales of Personal Information
In the preceding twelve (12) months, Company has not sold personal information.
Your Rights and Choices
The CCPA provides consumers (California residents) with specific rights regarding their personal information. This section describes your CCPA rights and explains how to exercise those rights.
Access to Specific Information and Data Portability Rights
You have the right to request that ISI Language Solutions disclose certain information to you about our collection and use of your personal information over the past 12 months. Once we receive and confirm your verifiable consumer request (see Exercising Access, Data Portability, and Deletion Rights), we will disclose to you:
- The categories of personal information we collected about you.
- The categories of sources for the personal information we collected about you.
- Our business or commercial purpose for collecting or selling that personal information.
- The categories of third parties with whom we share that personal information.
- The specific pieces of personal information we collected about you (also called a data portability request).
- If we sold or disclosed your personal information for a business purpose, two separate lists disclosing:
- sales, identifying the personal information categories that each category of recipient purchased; and
- disclosures for a business purpose, identifying the personal information categories that each category of recipient obtained.
Deletion Request Rights
You have the right to request that ISI Language Solutions delete any of your personal information that we collected from you and retained, subject to certain exceptions. Once we receive and confirm your verifiable consumer request (see Exercising Access, Data Portability, and Deletion Rights), we will delete (and direct our service providers to delete) your personal information from our records, unless an exception applies.
We may deny your deletion request if retaining the information is necessary for us or our service provider(s) to:
- Complete the transaction for which we collected the personal information, provide a good or service that you requested, take actions reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform our contract with you.
- Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity, or prosecute those responsible for such activities.
- Debug products to identify and repair errors that impair existing intended functionality.
- Exercise free speech, ensure the right of another consumer to exercise their free speech rights, or exercise another right provided for by law.
- Comply with the California Electronic Communications Privacy Act (Cal. Penal Code § 1546 seq.).
- Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement if you previously provided informed consent.
- Enable solely internal uses that are reasonably aligned with consumer expectations based on your relationship with us.
- Comply with a legal obligation.
- Make other internal and lawful uses of that information that are compatible with the context in which you provided it.
Exercising Access, Data Portability, and Deletion Rights
To exercise the access, data portability, and deletion rights described above, please submit a verifiable consumer request to us by either:
- Calling us at 818-753-9181.
- Visiting https://isilanguagesolutions.com/contact-us/.
- Email us at email@example.com
- Only you, or a person registered with the California Secretary of State that you authorize to act on your behalf, may make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child.
You may only make a verifiable consumer request for access or data portability twice within a 12-month period. The verifiable consumer request must:
- Provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative.
- Describe your request with sufficient detail that allows us to properly understand, evaluate, and respond to it.
We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you.
Making a verifiable consumer request does not require you to create an account with us.
We will only use personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.
For instructions on exercising sale opt-out rights, see Personal Information Sales Opt-Out and Opt-In Rights.
Response Timing and Format
We endeavor to respond to a verifiable consumer request within forty-five (45) days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing.
If you have an account with us, we will deliver our written response to that account. If you do not have an account with us, we will deliver our written response by mail or electronically, at your option.
Any disclosures we provide will only cover the 12-month period preceding the verifiable consumer request’s receipt. The response we provide will also explain the reasons we cannot comply with a request, if applicable. For data portability requests, we will select a format to provide your personal information that is readily useable and should allow you to transmit the information from one entity to another entity without hindrance.
We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request.
We will not discriminate against you for exercising any of your CCPA rights. Unless permitted by the CCPA, we will not:
- Deny you goods or services.
- Charge you different prices or rates for goods or services, including through granting discounts or other benefits, or imposing penalties.
- Provide you a different level or quality of goods or services.
- Suggest that you may receive a different price or rate for goods or services or a different level or quality of goods or services.
However, we may offer you certain financial incentives permitted by the CCPA that can resultin different prices, rates, or quality levels. Any CCPA-permitted financial incentive we offer will reasonably relate to your personal information’s value and contain written terms that describe the program’s material aspects. Participation in a financial incentive program requires your prior opt-in consent, which you may revoke at any time. We currently do not provide financial incentives.
Other California Privacy Rights
California’s “Shine the Light” law (Civil Code Section § 1798.83) permits users of our website that are California residents to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes. To make such a request, please send an email to firstname.lastname@example.org or write us at: ISI Language Solutions 700 N Brand Blvd Suite 950, Glendale, CA 91203
Changes to Our Privacy Notice
ISI Language Solutions reserves the right to amend this privacy notice at our discretion and at any time. When we make changes to this privacy notice, we will post the updated notice on the website and update the notice’s effective date. Your continued use of our website following the posting of changes constitutes your acceptance of such changes.
ISI Language Solutions