GDPR Customer Statement


The European Union (E.U.) has introduced the General Data Protection Regulation 2016/679 (“GDPR”), which is a new privacy regulation containing security and privacy requirements to fully protect data belonging to E.U. based individuals.

GDPR was adopted by the European Parliament in April 2016 and goes into effect on May 25, 2018.

GDPR is applicable for companies based in and out of the E.U. where data collection and personal data handling from EU-based individuals is in play.  Any information which can be used on its own or with other information to locate, contact or identify a single person such as names, identification numbers, online identifiers, location data, or any other factors specific to the individual’s genetic, physical, mental, physiological, cultural, economic, or social identity is considered to be Personally Identifiable Information (PII).

In order to be in compliance with GDPR, any company handling or collecting PII. I pertaining to EU-based individuals needs to ensure their data management protocol adheres to all requirements detailed within GDPR.

GDPR requirements

Included in the requirements for GDPR are cross-border data flow mechanisms, technical/operational security measures, notice & consent, accountability and data minimization.


  • Security audits: Records of security practices must be maintained by companies and regular audits to assess the effectiveness of the established security program must occur. If any breaches are identified, corrective measures must be taken immediately.
  • Data security: It is mandatory that companies put in place strict controls, including physical, technical and administrative. In accordance with GDPR requirements, incident management, data integrity, confidentiality, encryption, availability and resilience are required as part of the security program for any company handling EU-based data. Implemented controls must serve to prevent information leaks, data loss and unauthorized data access.
  • Data breach notification: Companies must immediately notify regulators, clients, and any and all impacted individuals once they become aware of a data breach which could potentially impact data controlled or processed by the Company.

As needed, please contact your ISI Language Solutions representative for further clarification.

Disclaimer: This document is not to be used as legal advice about any law or regulation. To understand the GDPR, customers must seek their own legal counsel.

Privacy Policy

Introduction (“Company” or “We“) respects your privacy and is committed to protecting it through our compliance with this policy. This policy describes the types of information we may collect from you or that you may provide when you visit our corporate website, (our “Website“), and our practices for collecting, using, maintaining, protecting, and disclosing that information. This policy applies to information we collect:

  1. On our corporate website
  2. In email, text, and other electronic messages between you and the domain
  3. Through mobile and desktop applications you download from this website, which provide dedicated non-browser-based interaction between you and this website
  4. When you interact with our advertising and applications on third-party websites and services, if those applications or advertising include links to this policy
  5. Information you provide to us when requesting services.

It does not apply to information collected by:

  1. us offline or through any other means, including on any other website operated by Company or any third party; or
  2. any third party, including through any application or content (including advertising) that may link to or be accessible from or on the website.

Please read this policy carefully to understand our policies and practices regarding your information and how we will treat it. If you do not agree with our policies and practices, your choice is not to use our website. By accessing or using this website, you agree to this privacy policy. This policy may change from time to time. Your continued use of this website after we make changes is deemed to be acceptance of those changes, so please check the policy periodically for updates.

Children under the age of 13

Our website is not intended for children under 13 years of age. No one under age 13 may provide any information to or on the website. We do not knowingly collect personal information from children under 13. If you are under 13, do not use or provide any information on this website or on or through any of its features. If we learn we have collected or received personal information from a child under 13 without verification of parental consent, we will delete that information. If you believe we might have any information from or about a child under 13, please contact us at:

Information we collect about you and how we collect it

We collect several types of information from and about users of our website, including information:

  1. by which you may be personally identified, such as name, postal address, email address, telephone number, or any other identifier by which you may be contacted online or offline (“personal information”);
  2. that is about you but individually does not identify you, such as the languages you speak or can read; and/or
  3. about your internet connection, the equipment you use to access our website, and usage details.

We collect this information:

  1. Directly from you when you provide it to us.
  2. Automatically as you navigate the site, information collected automatically may include usage details, I.P. addresses, and information collected through cookies, web beacons, and other tracking technologies.
  3. From third parties, for example, our business partners.

Information You Provide to Us. The information we collect on or through our website may include:

  1. Information that you provide by filling in forms on our website, such as our Contact Form on the corporate website. This includes information provided when registering to use our website or requesting further services such as a quote request or project approval. We may also ask you for information when you report a problem with our website
  2. Records and copies of your correspondence (including email addresses) if you contact us
  3. Your responses to surveys that we might ask you to complete for research purposes
  4. Details of transactions you carry out through our website and details of the fulfillment of your orders, including payment information, as you may be required to provide financial information before placing an order through our website
  5. Your search queries on the website

You also may provide information to be published or displayed (hereinafter, “posted“) on public areas of the website or transmitted to other users of the Website or third parties (collectively, “User Contributions“). Your User Contributions are posted on and transmitted to others at your own risk. Information We Collect Through Automatic Data Collection Technologies. As you navigate through and interact with our website, we may use automatic data collection technologies to collect certain information, not tied to your user profile on our portal, about your equipment, browsing actions, and patterns, including:

  1. Details of your visits to our website, including traffic data, location data, logs, and other communication data and the resources that you access and use on the website
  2. Information about your computer and internet connection, including your I.P. address, operating system, and browser type

We also may use these technologies to collect information about your online activities on our corporate website ( over time and across third-party websites or other online services (behavioral tracking). You may opt-out of behavioral tracking on this website by responding to the full site takeover when you first land. The information we collect automatically may include personal information that we may maintain or associate with the personal information we collect in other ways or receive from third parties. It helps us to improve our website and to deliver better and more personalized service, including by enabling us to:

  1. Estimate our audience size and usage patterns.
  2. Store information about your preferences, allowing us to customize our website according to your individual interests.
  3. Speed up your searches.
  4. Recognize you when you return to our website.

The technologies we use for this automatic data collection may include:

  1. Cookies (or browser cookies): A cookie is a small file placed on the hard drive of your computer. You may refuse to accept browser cookies by activating the appropriate setting on your browser. However, if you select this setting, you may be unable to access certain parts of our website. Unless you have adjusted your browser setting so that it will refuse cookies, our system will issue cookies when necessary for the functioning of the website or to improve your browsing experience.
  2. Web Beacons: Pages of our Website and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of certain website content and verifying system and server integrity).
Third-party use of cookies and other tracking technologies

Some content or applications, including advertisements, on the website are served by third-parties, including advertisers, ad networks and servers, content providers, and application providers. These third parties may use cookies alone or in conjunction with web beacons or other tracking technologies to collect information about you when you use our website. The information they collect may be associated with your personal information, or they may collect information, including personal information, about your online activities over time and across different websites and other online services. They may use this information to provide you with interest-based (behavioral) advertising or other targeted content. We do not control these third parties’ tracking technologies or how they may be used. If you have any questions about an advertisement or other targeted content, you should contact the responsible provider directly. HOW WE USE YOUR INFORMATION We use information that we collect about you or that you provide to us, including any personal information:

  1. To present our website and its contents to you
  2. To provide you with information, products, or services that you request from us.
  3. To fulfill any other purpose for which you provide it
  4. To provide you with notices about your account, including expiration and renewal notices
  5. To carry out our obligations and enforce our rights arising from any contracts entered into between you and us, including for billing and collection
  6. To notify you about changes to our website or any products or services we offer or provide though it
  7. To allow you to participate in interactive features on our website
  8. To deliver our language-based services to you
  9. In any other way, we may describe when you provide the information
  10. For any other purpose with your consent
  11. To comply with any relevant laws, regulations, ordinances, rules, directives, or statutes

If you chose to opt-in to receive marketing materials from us, possibly when you filled our “contact us” form on our corporate website (, be aware that we may use your information to contact you about our own and third-parties’ goods and services that may be of interest to you. If you do not want us to use your information in this way, please check the relevant box to opt-out located on the “Contact Us” form on our website or at the bottom of any marketing emails you may receive from us. You can also opt-out by sending an email to Legal bases for processing (For EEA users): If you are an individual in the European Economic Area (EEA), we collect and process information about you only where we have a legal basis for doing so under applicable E.U. laws. The legal basis depends on the Services you use and how you use them. This means we collect and use your information only where:

  • We need it to provide you with the Services you requested, including to operate the Services, provide customer support and personalized features, and to protect the safety and security of the Services, which includes all processing necessary for the performance of our contract(s) with you;
  • It satisfies a legitimate interest that is not outweighed by your data protection rights and interests, such as for research and development, to market and promote the Services and to protect our legal rights and interests;
  • You give us consent to do so for a specific purpose; or
  • We need to process your data to comply with a legal obligation.

If you have consented to our use of information about you for a specific purpose, you have the right to change your mind at any time, but this will not affect any processing that has already taken place. Where we are using your information because we or a third party (e.g. your employer) have a legitimate interest to do so, you have the right to object to that use though, in some cases, this may mean no longer using the Services. Location of your data: All of our information, including the information about you described in this Privacy Policy, is stored in the United States of America.

Disclosure of your information

We may disclose aggregated information about our users and information that does not identify any individual without restriction. We may disclose personal information that we collect, or you provide as described in this privacy policy:

  1. To our subsidiaries and affiliates
  2. To contractors, service providers, and other third parties we use to support our business and who are bound by contractual obligations to keep personal information confidential and use it only for the purposes for which we disclose it to them
  3. To a buyer or other successor in the event of a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of ISI Language Solutions’ assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held by ISI Language Solutions’ about our Website users is among the assets transferred
  4. To fulfill the purpose for which you provide it. For example, if you give us an email address to use the “email a friend” feature of our website, or copy a coworker on a request being made through our portal, we will transmit the contents of that email/request and possibly your email address to the recipients
  5. For any other purpose disclosed by us when you provide the information
  6. With your consent

We may also disclose your personal information:

  1. To comply with any court order, law, or legal process, including to respond to any government or regulatory request.
  2. To enforce or apply our Terms & Conditions or Privacy Policy and other agreements, including for billing and collection purposes.
  3. If we believe disclosure is necessary or appropriate to protect the rights, property, or safety of ISI Language Solutions, our customers, or others. This includes exchanging information with other companies and organizations for the purposes of fraud protection and credit risk reduction.
Choices about how we use and disclose your information

We strive to provide you with choices regarding the personal information you provide to us. We have created mechanisms to provide you with the following control over your information:

  1. Marketing Emails: You can review and change your personal information in our marketing systems by using the unsubscribe function on our marketing emails.
  2. Tracking Technologies and Advertising: You can set your browser to refuse all or some browser cookies or to alert you when cookies are being sent. If you disable or refuse cookies, please note that some parts of our website may then be inaccessible or not function properly.
  3. Promotional Offers from the Company. If you do not wish to have your contact information used by the Company to promote our own, you can opt-out by checking the relevant box located on the form on which we collect your data (the order/registration form) or at any other time by sending us an email stating your request to If we have sent you a promotional email, you may send us a return email asking to be omitted from future email distributions or use the opt-out feature on the email.
Accessing and correcting your information

We do our best to respect your privacy rights and provide you access and control over your data. You may make any of the following requests regarding your data by contacting us at

  1. Access and review your data.
  2. Correct your data or request that we delete some or all of it.
  3. Obtain copies of your data in human or and/or machine-readable format suitable for importing to other software.
  4. Restrict us from using or processing your data.

Be advised that we use a differential backup system; this means that we cannot delete your specific information from our inactive backups. We cannot delete your personal information except by also deleting your user account. We may not accommodate a request to change or delete information if we believe the change or deletion would violate any law or legal requirement or cause the information to be incorrect. If you delete your User Contributions from the website, copies of your User Contributions may remain viewable in cached and archived pages or might have been copied or stored by other Website users. Proper access and use of information provided on the website, including User Contributions, is governed by our Terms & Conditions.

Your California privacy rights California Civil Code Section § 1798.83 permits users of our website that are California residents to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes. To make such a request, please send an email to

Data security

We have implemented measures designed to secure your personal information from accidental loss and from unauthorized access, use, alteration, and disclosure. All information you provide to us is stored on secure servers behind firewalls. Any payment transactions and all sensitive personal data will be encrypted using commercially reasonable technology. We classify your information, but we require your assistance to most capably protect your data. We will ask you to mark data as (1) Unclassified, (2) Confidential, or (3) Sensitive, depending on your classification of any data you submit to us.  If you believe that the data you send to us contains personal data or other sensitive information, you must notify us by marking that information as Sensitive. When classifying your data, you should consider the following definitions:

  1. Confidential data is any proprietary data subject to non-disclosure and confidentiality contract obligations that would cause or create legal liability if accessed by unauthorized parties
  2. Restricted data is any Personal Data as that term is defined by the European Union’s General Data Protection Regulation and/or any similar laws or regulations, including but not limited to “personally identifiable information”, “private health information”, and/or “non-public information” as such terms are used in HIPAA, PCI-DSS, the Gramm-Leach-Bliley Act, or Sarbanes-Oxley. Sensitive data also includes valuable and proprietary information (including trade secrets), for which the loss, unauthorized access to, or unauthorized publication of would result in substantial or severe harm.

Your data is processed in our system as either Confidential or Restricted, depending on your classification. If you fail to classify your data, we will consider that data Confidential. Both Unclassified and Confidential data is Unrestricted. Our secure portal uses commercially reasonable technologies, processes, and procedures to maintain the confidentiality, integrity, and availability of all Confidential and Restricted data. While we still make commercially reasonable efforts to protect Unrestricted data, such data is not subject to our most expensive and stringent controls. The safety and security of your information also depend on you. Where we have given you (or where you have chosen) a password for access to certain parts of our website, you are responsible for keeping this password confidential. We ask you not to share your password with anyone. We urge you to be careful about giving out information in public areas of the website like message boards. The information you share in public areas may be viewed by any user of the website. Unfortunately, the transmission of information via the internet is not entirely secure. Although we do our best to protect your personal information, we cannot guarantee the security of your personal information transmitted to our website, particularly the end computer that you may be using to interact with our website. Any transmission of personal information is at your own risk. We are not responsible for circumvention of any privacy settings or security measures contained on the website, in this Privacy Policy, or on our Terms and Conditions.

Changes to our privacy policy

It is our policy to post any changes we make to our privacy policy on this page with a notice that the privacy policy has been updated on the corporate website. If we make material changes to how we treat our users’ personal information, we will notify you through a notice on the corporate website home page, via email, or when you log in to use our portal. The date the privacy policy was last revised is identified in the policy itself. You are responsible for ensuring we have an up-to-date active and deliverable email address for you, or for periodically visiting our website and this privacy policy to check for any changes.

Contact information

To ask questions or comment about this privacy policy and our privacy practices, contact us at:

Terms & Conditions

Last Modified: 10/29/2020

Acceptance of the Terms & Conditions

These Terms & Conditions are entered into by and between You and ISI Language Solutions (“Company“, “we” or “us“). The following terms and conditions, together with any documents they expressly incorporate by reference (collectively, these “Terms & Conditions”), govern your access to and use of, including any content, functionality, and services offered on or through (the “Website“), whether as a guest or a registered user. In order to request and obtain our translation and localization services (our “Services”), you must agree to these Terms & Conditions.

Please read the Terms & Conditions carefully before you start to use the website. By using the website or by clicking to accept or agree to the Terms & Conditions when this option is made available to you during account registration, you accept and agree to be bound and abide by these Terms & Conditions and our Privacy Policy, found at, incorporated herein by reference. If you do not want to agree to either these Terms & Conditions or the Privacy Policy, you must not access or use the website.

This website is offered and available to users who are 18 years of age or older, competent to enter into contracts, and authorized to provide us with all necessary information to perform any Services you request from us. By using this website, you represent and warrant that you are of legal age to form a binding contract with the Company and meet all of the foregoing eligibility requirements. If you do not meet all of these requirements, you must not access or use the website.

Changes to the Terms & Conditions

We may revise and update these Terms & Conditions from time to time in our sole discretion. All changes are effective immediately when we post them and apply to all access to and use of the website thereafter. However, if you have a registered account with us, you will be given an opportunity to stop accessing and using the website if you do not agree to our revisions or updates. Additionally, any changes to the dispute resolution provisions set forth in Governing Law and Jurisdiction will not apply to any disputes for which the parties have actual notice on or prior to the date the change is posted on the website.

Your continued use of the website following the posting of revised Terms & Conditions means that you accept and agree to the changes. You are expected to check this page from time to time so you are aware of any changes, as they are binding on you. However, we will make commercially reasonable efforts to notify you of any material changes if you are a registered user of the website.

Accessing the Website and Account Security

We reserve the right to withdraw or amend this website, and any service or material we provide on the website, in our sole discretion without notice. We will not be liable if for any reason all or any part of the website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the website, or the entire website, to users, including registered users.

You are responsible for:

  1. Making all arrangements necessary for you to have access to the website
  2. Ensuring that all persons who access the website through your internet connection are aware of these Terms & Conditions and comply with them

To access the website or some of the resources it offers, you may be asked to provide certain registration details or other information. It is a condition of your use of the website that all the information you provide on the website is correct, current, and complete. You agree that all information you provide to register with this website or otherwise, including but not limited to through the use of any interactive features on the website, is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy.

If you choose or are provided with a user name, password, or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information.

We have the right to disable any user name, password, or other identifier, whether chosen by you or provided by us, at any time if, in our opinion, you have violated any provision of these Terms & Conditions.

Intellectual Property Rights

The website and its entire contents, features, and functionality (including but not limited to all information, software, text, displays, images, video and audio, and the design, selection, and arrangement thereof), are owned by the Company, its licensors or other providers of such material and are protected by the United States and international copyright, trademark, patent, trade secret and other intellectual property or proprietary rights laws.


The Company name, the Company logo, and all related names, logos, product and service names, designs, and slogans are trademarks of the Company or its affiliates or licensors. You must not use such marks without the prior written permission of the Company. All other names, logos, product and service names, designs, and slogans on this website are the trademarks of their respective owners.

Prohibited Uses

You may use the website only for lawful purposes and in accordance with these Terms & Conditions. You agree not to use the website:

  1. In any way that violates any applicable federal, state, local or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the U.S. or other countries)
  2. For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information or otherwise
  3. To send, knowingly receive, upload, download, use, or re-use any material which does not comply with the Data Classification & Content Standards set out in these Terms & Conditions.
  4. To transmit, or procure the sending of, any advertising or promotional material, including any “junk mail”, “chain letter” or “spam” or any other similar solicitation
  5. To impersonate or attempt to impersonate the Company, a Company employee, another user or any other person or entity (including, without limitation, by using email addresses associated with any of the foregoing)
  6. To engage in any other conduct that restricts or inhibits anyone’s use or enjoyment of the website or which, as determined by us, may harm the Company or users of the website or expose them to liability.

Additionally, you agree not to:

  1. Use the website in any manner that could disable, overburden, damage, or impair the site or interfere with any other party’s use of the website, including their ability to engage in real-time activities through the website
  2. Use any robot, spider, or other automatic device, process, or means to access the website for any purpose, including monitoring or copying any material on the website.
  3. Use any manual process to monitor or copy any of the material on the website or for any other unauthorized purpose without our prior written consent
  4. Use any device, software, or routine that interferes with the proper working of the website
  5. Introduce any viruses, trojan horses, worms, logic bombs, or other material which is malicious or technologically harmful
  6. Attempt to gain unauthorized access to, interfere with, damage or disrupt any parts of the website, the server on which the website is stored, or any server, computer, or database connected to the website
  7. Attack the website via a denial-of-service attack or a distributed denial-of-service attack
  8. Otherwise, attempt to interfere with the proper working of the website
User Data

The website includes access to your customer portal, which contains chat functionality, file upload and download systems, and access to our Services, and may include other interactive features (collectively, “Interactive Services“) that allow users to post, submit, publish, display or transmit to other users or other persons (hereinafter, “post“) content or materials (collectively, “User Data“) on or through the website, including User Data you ask us to translate or localize.

All User Data must comply with the Data Classification & Content Standards set out in these Terms & Conditions.

Any User Contribution you post to the site will be considered non-confidential and non-proprietary unless you properly comply with the Data Classification & Consent Standards set forth below. By providing any User Contribution on the website, you grant us and our affiliates and service providers, and each of their and our respective licensees, successors, and assigns the right to use, reproduce, modify, perform, display, distribute, and otherwise disclose to third parties any such material for the purpose of providing you with any requested Services.

You represent and warrant that:

  1. You own or control all rights in and to the User Data and have the right to grant the license granted above to ISI Language Solutions, our affiliates, and service providers and us, and each of their and our respective licensees, successors, and assigns
  2. All of your User Data do and will comply with these Terms & Conditions

You understand and acknowledge that you are responsible for any User Data you submit or contribute. You, not the Company, have full responsibility for such content, including its legality, reliability, accuracy, and appropriateness.

We are not responsible or liable to any third party for the content or accuracy of any User Data posted by you or any other user of the website

Monitoring and Enforcement; Termination

We have the right to:

  1. Remove or refuse to process any User Data for any or no reason in our sole discretion
  2. Take any action with respect to any User Contribution that we deem necessary or appropriate in our sole discretion, including if we believe that such User Contribution violates the Terms & Conditions, including the Data Classification & Content Standards, infringes any intellectual property right or other rights of any person or entity, threatens the personal safety of users of the website or the public or could create liability for the Company
  3. Disclose your identity or other information about you to any third party who claims that material posted by you violates their rights, including their intellectual property rights or their right to privacy.
  4. Take appropriate legal action, including without limitation, referral to law enforcement, for any illegal or unauthorized use of the website.
  5. Terminate or suspend your access to all or part of the website for any violation of these Terms & Conditions.

Without limiting the foregoing, we have the right to fully cooperate with any law enforcement authorities or court order requesting or directing us to disclose the identity or other information of anyone posting any materials on or through the website. YOU WAIVE AND HOLD HARMLESS THE COMPANY AND ITS AFFILIATES, LICENSEES AND SERVICE PROVIDERS FROM ANY CLAIMS RESULTING FROM ANY ACTION TAKEN BY ANY OF THE FOREGOING PARTIES DURING OR AS A RESULT OF ITS INVESTIGATIONS AND FROM ANY ACTIONS TAKEN AS A CONSEQUENCE OF INVESTIGATIONS BY EITHER SUCH PARTIES OR LAW ENFORCEMENT AUTHORITIES.

However, we cannot review all material before it is posted on the website and cannot ensure prompt removal of objectionable material after it has been posted. Accordingly, we assume no liability for any action or inaction regarding transmissions, communications, or content provided by any user or third party. We have no liability or responsibility to anyone for performance or nonperformance of the activities described in this section.

Data Classification & Content Standards

These data classification and content standards apply to any and all User Data and use of Interactive Services, including our translation Services. User Data must, in their entirety, comply with all applicable federal, state, local, and international laws and regulations. Without limiting the foregoing, User Data must not:

  1. Knowingly infringe any patent, trademark, trade secret, copyright or other intellectual property or other rights of any other person
  2. Knowingly violate the legal rights (including the rights of publicity and privacy) of others or contain any material that could give rise to any civil or criminal liability under applicable laws or regulations or that otherwise may be in conflict with these Terms & Conditions and our Privacy Policy
  3. Promote or constitute any illegal activity, or advocate, promote or assist any unlawful act.
  4. Give the impression that they emanate from or are endorsed by a third party if this is not the case

Further, you agree that you are solely responsible for classifying your data and notifying us if your User Data contains Sensitive information, including Personal Data, as defined by Article 4(1) of the European Union’s General Data Protection Regulation. When submitting User Data to us, you must mark the data as one of the three following classes as defined in our Privacy Policy :

  1. Confidential data is any proprietary or otherwise non-public information subject to non-disclosure and confidentiality contract obligations that would cause or create legal liability if accessed by unauthorized parties. We will treat User Data classified as Confidential as Unrestricted
  2. Restricted data is any Personal Data as that term is defined by the European Union’s General Data Protection Regulation and/or any similar laws or regulations, including but not limited to “personally identifiable information”, “private health information”, and/or “non-public information” as such terms are used in HIPAA, PCI-DSS, the Gramm-Leach-Bliley Act, or Sarbanes-Oxley. Sensitive data also includes valuable and proprietary information (including trade secrets), for which the loss, unauthorized access to, or unauthorized publication would result in substantial or severe harm. Ultimately, you are responsible for deciding if your data is sensitive or not. We will treat User Data classified as Sensitive as Restricted information.

Your data is processed in our system as either Unrestricted or Restricted, depending on your classification. If you fail to classify your data, we will consider that data Unrestricted. Both Unclassified and Confidential data is Unrestricted. Sensitive data is Restricted. Our secure portal uses commercially reasonable technologies, processes and procedures to maintain the confidentiality, integrity, and availability of all Confidential and Restricted data. While we still make commercially reasonable efforts to protect Unrestricted data, such data is not subject to our most expensive and stringent controls.

You must properly classify your data as required under these Terms & Conditions for us to leverage our technical and organizational measures designed to protect the confidentiality, integrity, and availability of your User Data. If you do not use to send us User Data, we make no guarantees or warranties related to the security or safety of such improperly submitted User Data.

Changes to the Website

We may update the content on this website from time to time, but its content is not necessarily complete or up-to-date. Any of the material on the website may be out of date at any given time, and we are under no obligation to update such material.

Information About You and Your Visits to the Website

All information we collect on this website is subject to our Privacy Policy. By using the website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

Linking to the Website and Social Media Features

You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval or endorsement on our part without our express written consent.

This website may provide certain social media features that enable you to:

  1. Link from your own or certain third-party websites to certain content on this website.
  2. Send emails or other communications with certain content or links to certain content on this website.
  3. Cause limited portions of content on this website to be displayed or appear to be displayed on your own or certain third-party websites.

You may use these features solely as they are provided by us, solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not:

  1. Establish a link from any website that is not owned by you.
  2. Cause the website or portions of it to be displayed, or appear to be displayed by, for example, framing, deep linking, or in-line linking, on any other site.
  3. Link to any part of the website other than the homepage.
  4. Otherwise, take any action with respect to the materials on this website that is inconsistent with any other provision of these Terms & Conditions.
  5. You agree to cooperate with us in causing any unauthorized framing or linking immediately to cease. We reserve the right to withdraw linking permission without notice.

We may disable all or any social media features and any links at any time without notice at our discretion.

If the website contains links to other sites and resources provided by third parties, these links are provided for your convenience only. This includes links contained in advertisements, including banner advertisements and sponsored links, if applicable. We have no control over the contents of those sites or resources and accept no responsibility for them or for any loss or damage that may arise from your use of them. If you decide to access any of the third-party websites linked to this website, you do so entirely at your own risk and subject to the terms and conditions of use for such websites.

Geographic Restrictions

The owner of the website is based in the state of Florida in the United States. We provide this website for use only by persons located in the United States and any other location where accessing this website is legal. We make no claims that the website or any of its content is accessible or appropriate outside of the United States. Access to the Website may not be legal by certain persons or in certain countries. If you access the website from outside the United States, you do so on your own initiative and are responsible for compliance with local laws, except for laws relating to privacy rights and responsibilities, including the GDPR.


You understand that we cannot and do not guarantee or warrant that files available for downloading from the internet or the website will be free of viruses or other destructive code, except for files that ISI Language Solutions has provided for you to download using our Restricted security option via our portal. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for anti-virus protection and accuracy of data input and output and for maintaining a means external to our site for any reconstruction of any lost data. WE WILL NOT BE LIABLE FOR ANY LOSS OR DAMAGE CAUSED BY A DISTRIBUTED DENIAL-OF-SERVICE ATTACK, VIRUSES OR OTHER TECHNOLOGICALLY HARMFUL MATERIAL THAT MAY INFECT YOUR COMPUTER EQUIPMENT, COMPUTER PROGRAMS, DATA OR OTHER PROPRIETARY MATERIAL DUE TO YOUR USE OF THE WEBSITE OR ANY SERVICES OR ITEMS OBTAINED THROUGH THE WEBSITE OR TO YOUR DOWNLOADING OF ANY MATERIAL POSTED ON IT, OR ON ANY WEBSITE LINKED TO IT.




Limitation on Liability




You agree to defend, indemnify and hold harmless the Company, its affiliates, licensors and service providers, and its and their respective officers, directors, employees, contractors, agents, licensors, suppliers, successors and assigns from and against any claims, liabilities, damages, judgments, awards, losses, costs, expenses or fees (including reasonable attorneys’ fees) arising out of or relating to your violation of these Terms & Conditions or your use of the website, including, but not limited to, your User Data, any use of the website’s content, services and products other than as expressly authorized in these Terms & Conditions or your use of any information obtained from the website.

Governing Law and Jurisdiction

All matters relating to the Website and these Terms & Conditions and any dispute or claim arising therefrom or related thereto (in each case, including non-contractual disputes or claims) shall be governed by and construed in accordance with the internal laws of the State of Georgia without giving effect to any choice or conflict of law provision or rule (whether of the State of Georgia or any other jurisdiction).

Any legal suit, action or proceeding arising out of, or related to, these Terms & Conditions or the website shall be instituted exclusively in the federal courts of the United States or the courts of the State of Georgia in each case located in the City of Atlanta and County of Fulton although we retain the right to bring any suit, action or proceeding against you for breach of these Terms & Conditions in your country of residence or any other relevant country. You waive any and all objections to the exercise of jurisdiction over you by such courts and to venue in such courts.

Waiver and Severability

No waiver of by the Company of any term or condition set forth in these Terms & Conditions shall be deemed a further or continuing waiver of such term or condition or a waiver of any other term or condition, and any failure of the Company to assert a right or provision under these Terms & Conditions shall not constitute a waiver of such right or provision.

If any provision of these Terms & Conditions is held by a court or other tribunal of competent jurisdiction to be invalid, illegal or unenforceable for any reason, such provision shall be eliminated or limited to the minimum extent such that the remaining provisions of the Terms & Conditions will continue in full force and effect.

Entire Agreement

Provided that you have not executed a Master Services Agreement or Data Processing Agreement with ISI Language Solutions, these Terms & Conditions and our Privacy Policy constitute the sole and entire agreement between you and ISI Language Solutions with respect to the website and supersede all prior and contemporaneous understandings, agreements, representations and warranties, both written and oral, with respect to the website.

Your Comments and Concerns

This website is operated by ISI Langauge Solutions, located at 700 N Brand Blvd #950, Glendale, CA 91203

All other feedback, comments, requests for technical support and other communications relating to the website should be directed to:

Information Security Policy (I.S.P.)

1. Introduction

According to standard definitions, an Information Security Policy is a set of rules enacted by an organization to ensure that all users or networks of the I.T. structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority. Attaining this goal involves setting up an Information Security Policy for the organization and ensuring its adherence. This policy should cover things like acceptable uses of technology, risk reviews at a senior level, operational security procedures, and other general administrative tasks.

An I.S.P. is governing the protection of information, which is an asset the organization needs to protect. Information may be printed, written, spoken, visually explained. In addition, it can be mailed, sent electronically, visually, or verbally transmitted. Information should be appropriately secured regardless of its nature, transmission, or storage.

2. Purpose

The organization has implemented the I.S.P. with the goal of identifying, assessing, and taking steps to avoid or to mitigate risk to ISI Language Solutions information assets. Information security is achieved by implementing a suitable set of controls, including policies, organizational structures, and software and hardware functions. These controls are established, implemented, monitored, and controlled to ensure that the specific security and business objectives of the organization are met. Such is executed in conjunction with the 9001 Quality Management System (Q.M.S.) processes implemented by the organization.

To implement and properly maintain a robust information security function, the organization recognizes the importance of:

  1. Understanding the information security requirements and the need to establish policy and objectives for information security;
  2. Understanding, assessing and measuring risks posed to and by ISI Language Solutions’ information assets;
  3. Implementing and operating controls to manage the organization’s information security risks in the context of overall business risks;
  4. Ensuring all employees of the organization are aware of their responsibilities in assets protection and security.
  5. Monitoring and reviewing the performance and effectiveness of information security policies and controls; and
  6. Continually improving the assessments, measurements, and changes that affect risk.
3. Scope

This policy and all related documentation apply to all information, information systems, networks, applications, locations, and users of ISI Language Solutions or external providers.

4. Roles, Responsibilities, and Authorities

4.1 security organization management

The Management Team, including the V.P. of Technology, have established an 07F18 Security Management Structure document. The Security Management Team has the following responsibilities and authority assigned:

  • Review security policies.
  • Assign security roles.
  • Coordinate and review the implementation of security across the organization.

Information security responsibilities are clearly defined, maintained, and communicated. These responsibilities include the security of ISI Language Solutions information assets and information technology that are accessed, processed, communicated to, or managed by external parties.

4.2 roles and responsibilities

The Information Security Policy has been established, documented, and is maintained with the purpose of continuous improvement and assurance that the organization’s information is secure. Within the Information Security Policy, roles and responsibilities have been defined and assigned to specific individuals or groups within its organization.

Information Security Steering Group (ISSG): Responsible for information security in the organization to reduce risk exposure and ensure the organization’s activities do not introduce undue risk. The group is responsible for ensuring compliance with established security policies, processes and security initiatives, and with state and federal regulations.

Information Security Officer (ISO): Responsible for information security at the business level for reducing risk exposure, drafting policies, and for ensuring the organization’s activities do not introduce undue risk to the enterprise. The ISO is responsible for ensuring compliance and adherence to this policy.

Information Asset Owner (I.A.O.): Responsible for approving decisions regarding controls and access privileges, performing periodic reclassification and ensuring regular reviews for value and updates to manage changes to risk.

User: Responsible for complying with the provisions of policies and procedures.

The table below uses the RACI (R= Responsible A= Accountable C= Consulted I= Informed) model, for identifying roles and responsibilities during an organizational change process

Area of ResponsibilityISSGISOIAOUser
Establish the Information Security Program (ISP)ARCN/A
Implement and Operate the ISPARCN/A
Monitor and Review the ISPA/RRCN/A
Maintain and Improve the ISPA/RRCN/A
Management ResponsibilityA/RRCN/A
Resource ManagementARIN/A
Provision of ResourcesA/RCIN/A
Training, Awareness and CompetenceA/RRCI
Internal ISP AuditsA/RRCI
Establish ControlsARCI
Storage of Source CodeN/ARN/AN/A

Managers: Managers ensure employees are aware of the relevance and importance of their activities and how they contribute to the achievement of information security objectives. They also ensure that

employees are aware of and comply with all information security policies and procedures of the organization relevant to their role.

I.T. Team: The team is responsible of the following areas related to information security:

  • Managing related processes, such as incident and change management
  • Providing technical expertise related to information security
  • Implementing technical controls
  • System administration, e.g., user creation, backups
  • Security monitoring, e.g., network intrusions
  • Reporting actual or potential security breaches
  • Contributing to risk assessment where required
5. Identification and Authentication

The organization has defined the expectation and principles relating to how system setup and credential privileges should be managed. User accounts and privileges shall be managed correctly to ensure authorized user access to information systems is possible while unauthorized access is not, such as but not limited to:

  1. Authorization to manage user accounts and privileges: The H.R. Business Partner triggers the request, authorization may be given through line management, by the Manager and/or Director of the area in question.
  2. Management of user accounts and privileges: Specific staff is authorized to control login accounts and permissions for systems that the I.T. team does not manage. The I.T. team may delegate specific limited responsibilities for managing accounts and permissions to staff in other departments. See 07F18 Security Management Structurefor more details.
  3. Users’ access rights must be adjusted in a timely manner to provide only authorized and necessary access. This should take place whenever there is a change in business need, a change in an employee’s role or when an employee leaves the organization.
  4. Password management. Once access to a system or application is authorized, the user is to be informed of their temporary password in a secure manner. This temporary password must be changed immediately; this should be enforced automatically by the system.See 04M06 Password Policy for more details.
  5. Deletion of user access upon exiting the organization.
  6. A monthly audit is conducted of login access to ensure accuracy and remove access to those users which are no longer eligible or required. See07P08 I.T. Service Desk S.O.P. for more details.
6. Handling of Incidents and I.T. Requests

The I.T. Team has established procedures to ensure a consistent and effective approach to the management of information security incidents and I.T. requests, including communication on security events and weaknesses. It enables the efficient and effective management of information security incidents by providing structure for the reporting and management of such incidents.

Information security incidents and I.T. requests shall be reported promptly and responded to in a quick, effective, and orderly manner to reduce the negative effect of incidents, repair damage, and mitigate future risks. Tickets are to be submitted to I.T. Help Desk I.A.W. 07P08 I.T. Service Desk S.O.P.

Weekly reports will be generated by the I.T. Service Desk system for all tickets labeled ‘security’. Trends will be analyzed to determine if any discernible patterns require further investigation.

The I.T. team has daily meetings where, if necessary, post-mortem and trend analysis is discussed. Any serious incidents should be recorded in the Non-Conformance log, and a C.A.R. may be originated I.A.W. 10P01 Corrective Action Request S.O.P., if deemed necessary.

7. Change Management

ISI Language Solutions has deployed a change management process in order to prevent unintended service disruptions and to maintain the integrity of all company services. There is segregation of duties, and all requests go through a workflow process consisting of request, approval, implementation, and review I.A.W. 07P08 I.T. Service Desk S.O.P. Rollback procedures are documented in case there is a need to go back to a previous state, even though change plans are related to minimal marketable features (MMF) most of the time. Layers of authorization and logging exist, so that production changes are controlled and monitored. Only authorized engineers are able to login to central configuration management machines from where production changes can be applied. ISI Language Solutions communicates to different stakeholders when the services might be adversely affected.

8. Risk Management

Risk assessments will identify, quantify, and prioritize threats that may become relevant to the organization. The results will guide and determine appropriate organization action and priorities for managing information security risks and for implementing controls needed to protect information assets.

Risk management will include the following steps:

  1. Identify the risks
    • Identify the organization’s assets and the associated information owners.
    • Identify the threats to those assets.
    • Identify the vulnerabilities that might be exploited by the threats.
    • Identify the impacts that losses of confidentiality, integrity, and availability may have on the assets.
  2. Analyze and evaluate the risks
    • Assess the impacts on the organization that may result from security failures, taking into account the consequences of a loss of confidentiality, integrity, or availability of those assets.
    • Assess the risk of security failures occurring due to the vulnerabilities and impacts associated with the assets and the implemented controls.
    • Estimate the level of risks.
    • Determine whether the risks are acceptable.
  3. Identify and evaluate options for the treatment of risk
    • Apply appropriate controls.
    • Accept the risks.
    • Avoid the risks.
  4. Transfer the associated risks to other parties.
    • Select control objectives and controls for the treatment of risk
    • The organization is committed to continually monitoring, reviewing and analyzing potential risks to ensure requirements are effectively managed in the 05M03 Information Security Policy. Identified risks and opportunities are recorded and managed using the 06F02 Risks and Opportunities Management Document
    • The I.T. Help Desk and Non-Conformance log provide visibility into potential risks to the organization as regards the security information and allowing effective, related decision making.
  5. Threats Related Risk Management
    • Risk threats are managed in accordance with established internal policies and procedures. Additional information available under N.D.A.

Details of our selected controls and how they have been implemented and measured are considered confidential information and restricted to ISI Language Solutions The following sections have been removed to make this document available to the public: security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management, business continuity management and compliance.

Isilanguagesolutions.Com Privacy Notice For California Residents

Effective Date: January 1, 2020

Last Reviewed on: January 31, 2020

This Privacy Notice for California Residents supplements the information contained in ISI Language Solutions’ Privacy Policy and applies solely to all visitors, users, and others who reside in the State of California (“consumers” or “you”). We adopt this notice to comply with the California Consumer Privacy Act of 2018 (CCPA) and any terms defined in the CCPA have the same meaning when used in this notice.

Information We Collect

Our website collects information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device (“personal information“). In particular, ISI Language Solutions’ Website has collected the following categories of personal information from its consumers within the last twelve (12) months:

A. Identifiers.A real name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, Social Security number, driver’s license number, passport number, or other similar identifiers.YES
B. Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)).A name, signature, Social Security number, physical characteristics or description, address, telephone number, passport number, driver’s license or state identification card number, insurance policy number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information, medical information, or health insurance information.Some personal information included in this category may overlap with other categories.YES
C. Protected classification characteristics under California or federal law.Age (40 years or older), race, color, ancestry, national origin, citizenship, religion or creed, marital status, medical condition, physical or mental disability, sex (including gender, gender identity, gender expression, pregnancy or childbirth and related medical conditions), sexual orientation, veteran or military status, genetic information (including familial genetic information).NO
D. Commercial information.Records of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies.YES
E. Biometric information.Genetic, physiological, behavioral, and biological characteristics, or activity patterns used to extract a template or other identifier or identifying information, such as, fingerprints, faceprints, and voiceprints, iris or retina scans, keystroke, gait, or other physical patterns, and sleep, health, or exercise data.NO
F. Internet or other similar network activity.Browsing history, search history, information on a consumer’s interaction with a website, application, or advertisement.YES
G. Geolocation data.Physical location or movements. NO
H. Sensory data.Audio, electronic, visual, thermal, olfactory, or similar information.YES
I. Professional or employment-related information.Current or past job history or performance evaluations.NO
J. Non-public education information (per the Family Educational Rights and Privacy Act (20 U.S.C. Section 1232g, 34 C.F.R. Part 99)).Education records directly related to a student maintained by an educational institution or party acting on its behalf, such as grades, transcripts, class lists, student schedules, student identification codes, student financial information, or student disciplinary records. NO
K. Inferences drawn from other personal information.Profile reflecting a person’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes.

Personal information does not include:

  • Publicly available information from government records.
  • Deidentified or aggregated consumer information.
  • Information excluded from the CCPA’s scope, like:
    • health or medical information covered by the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the California Confidentiality of Medical Information Act (CMIA) or clinical trial data;
    • personal information covered by certain sector-specific privacy laws, including the Fair Credit Reporting Act (FRCA), the Gramm-Leach-Bliley Act (GLBA) or California Financial Information Privacy Act (FIPA), and the Driver’s Privacy Protection Act of 1994.

ISI Language Solutions obtains the categories of personal information listed above from the following categories of sources:

  • Directly from you. For example, from forms you complete or products and services you purchase.
  • Indirectly from you. For example, from observing your actions on our website.
  • Directly from third parties who engage us to provide services. For example, from parties you have interacted with and who may require translation or localization services to conduct their business with you.

Use of Personal Information

We may use or disclose the personal information we collect for one or more of the following business purposes:

  • To fulfill or meet the reason you provided the information. For example, if you share your name and contact information to request a price quote or ask a question about our products or services, we will use that personal information to respond to your inquiry. If you provide your personal information to purchase a product or service, we will use that information to process your payment and facilitate delivery. We may also save your information to facilitate new product orders or process returns.
  • To provide, support, personalize, and develop our website, products, and services.
  • To create, maintain, customize, and secure your account with us.
  • To process your requests, purchases, transactions, and payments and prevent transactional fraud.
  • To provide you with support and to respond to your inquiries, including to investigate and address your concerns and monitor and improve our responses.
  • To personalize your Website experience and to deliver content and product and service offerings relevant to your interests, including targeted offers and ads through our website, third-party sites, and via email or text message (with your consent, where required by law).
  • To help maintain the safety, security, and integrity of our website, products and services, databases and other technology assets, and business.
  • For testing, research, analysis, and product development, including to develop and improve our website, products, and services.
  • To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.
  • As described to you when collecting your personal information or as otherwise set forth in the CCPA.
  • To evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of ISI Language Solutions’ assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal information held by ISI Language Solutions about our Website users is among the assets transferred.

ISI Language Solutions will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.

Sharing Personal Information

ISI Language Solutions may disclose your personal information to a third party for a business purpose. When we disclose personal information for a business purpose, we enter a contract that describes the purpose and requires the recipient to both keep that personal information confidential and not use it for any purpose except performing the contract.

We share your personal information with the following categories of third parties:

  • Service providers.
  • Third-party customers who engage us to provide translation or localization services that may be related to your personal information.

Disclosures of Personal Information for a Business Purpose

In the preceding twelve (12) months, Company has disclosed the following categories of personal information for a business purpose:

Category A: Identifiers.

Category B: California Customer Records personal information categories.

Category C: Protected classification characteristics under California or federal law.

Category D: Commercial information.

Category F: Internet or other similar network activity.

Category H: Sensory data.

Category K: Inferences drawn from other personal information.

We disclose your personal information for a business purpose to the following categories of third parties:

  • Service providers.
  • Third-party customers who engage us to provide translation or localization services that may be related to your personal information.

Sales of Personal Information 

In the preceding twelve (12) months, Company has not sold personal information.

Your Rights and Choices

The CCPA provides consumers (California residents) with specific rights regarding their personal information. This section describes your CCPA rights and explains how to exercise those rights.

Access to Specific Information and Data Portability Rights

You have the right to request that ISI Language Solutions disclose certain information to you about our collection and use of your personal information over the past 12 months. Once we receive and confirm your verifiable consumer request (see Exercising Access, Data Portability, and Deletion Rights), we will disclose to you:

  • The categories of personal information we collected about you.
  • The categories of sources for the personal information we collected about you.
  • Our business or commercial purpose for collecting or selling that personal information.
  • The categories of third parties with whom we share that personal information.
  • The specific pieces of personal information we collected about you (also called a data portability request).
  • If we sold or disclosed your personal information for a business purpose, two separate lists disclosing:
    • sales, identifying the personal information categories that each category of recipient purchased; and
    • disclosures for a business purpose, identifying the personal information categories that each category of recipient obtained.

Deletion Request Rights 

You have the right to request that ISI Language Solutions delete any of your personal information that we collected from you and retained, subject to certain exceptions. Once we receive and confirm your verifiable consumer request (see Exercising Access, Data Portability, and Deletion Rights), we will delete (and direct our service providers to delete) your personal information from our records, unless an exception applies.

We may deny your deletion request if retaining the information is necessary for us or our service provider(s) to:

  1. Complete the transaction for which we collected the personal information, provide a good or service that you requested, take actions reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform our contract with you.
  2. Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity, or prosecute those responsible for such activities.
  3. Debug products to identify and repair errors that impair existing intended functionality.
  4. Exercise free speech, ensure the right of another consumer to exercise their free speech rights, or exercise another right provided for by law.
  5. Comply with the California Electronic Communications Privacy Act (Cal. Penal Code § 1546  seq.).
  6. Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement if you previously provided informed consent.
  7. Enable solely internal uses that are reasonably aligned with consumer expectations based on your relationship with us.
  8. Comply with a legal obligation.
  9. Make other internal and lawful uses of that information that are compatible with the context in which you provided it.

Exercising Access, Data Portability, and Deletion Rights

To exercise the access, data portability, and deletion rights described above, please submit a verifiable consumer request to us by either:

  • Calling us at 818-753-9181.
  • Visiting
  • Email us at
  • Only you, or a person registered with the California Secretary of State that you authorize to act on your behalf, may make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child.

You may only make a verifiable consumer request for access or data portability twice within a 12-month period. The verifiable consumer request must:

  • Provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative.
  • Describe your request with sufficient detail that allows us to properly understand, evaluate, and respond to it.

We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you.

Making a verifiable consumer request does not require you to create an account with us.

We will only use personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.

For instructions on exercising sale opt-out rights, see Personal Information Sales Opt-Out and Opt-In Rights.

Response Timing and Format

We endeavor to respond to a verifiable consumer request within forty-five (45) days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing.

If you have an account with us, we will deliver our written response to that account. If you do not have an account with us, we will deliver our written response by mail or electronically, at your option.

Any disclosures we provide will only cover the 12-month period preceding the verifiable consumer request’s receipt. The response we provide will also explain the reasons we cannot comply with a request, if applicable. For data portability requests, we will select a format to provide your personal information that is readily useable and should allow you to transmit the information from one entity to another entity without hindrance.

We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request.


We will not discriminate against you for exercising any of your CCPA rights. Unless permitted by the CCPA, we will not:

  • Deny you goods or services.
  • Charge you different prices or rates for goods or services, including through granting discounts or other benefits, or imposing penalties.
  • Provide you a different level or quality of goods or services.
  • Suggest that you may receive a different price or rate for goods or services or a different level or quality of goods or services.

However, we may offer you certain financial incentives permitted by the CCPA that can resultin different prices, rates, or quality levels. Any CCPA-permitted financial incentive we offer will reasonably relate to your personal information’s value and contain written terms that describe the program’s material aspects. Participation in a financial incentive program requires your prior opt-in consent, which you may revoke at any time. We currently do not provide financial incentives.

Other California Privacy Rights

California’s “Shine the Light” law (Civil Code Section § 1798.83) permits users of our website that are California residents to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes. To make such a request, please send an email to or write us at: ISI Language Solutions 700 N Brand Blvd Suite 950, Glendale, CA 91203

Changes to Our Privacy Notice

ISI Language Solutions reserves the right to amend this privacy notice at our discretion and at any time. When we make changes to this privacy notice, we will post the updated notice on the website and update the notice’s effective date. Your continued use of our website following the posting of changes constitutes your acceptance of such changes.

Contact Information

If you have any questions or comments about this notice, the ways in which ISI Language Solutions collects and uses your information described below and in the Privacy Policy, your choices and rights regarding such use, or wish to exercise your rights under California law, please do not hesitate to contact us at:

Phone: 818-753-9181



Postal Address:

ISI Language Solutions
Attn: Compliance

700 N Brand Blvd #950, Glendale, CA 91203