If we collect any personal information, it will be knowingly and voluntarily submitted by you and we would tell you how we plan to use it. For example, when enquiring about Liquidity’s services or signing up to Liquid101 we may ask for details such as (but not limited to) your name, email address and/or phone number in order to contact you. Without these details, we may be unable to supply you with the information or services you are interested in, either to a sufficient standard or at all. You may opt-out of receiving future mailings at any time.
Use of Information
Occasionally, we may enter into contracts with friends from third parties, including but not limited to web hosting providers, systems administrators and consultants. This will only be in order to improve our website or services for your benefit. These contracts prohibit them from using any of your personal details for their own purposes.
Use of Web Technologies
Your activities on our website helps us diagnose problems with our server, administer our website and to tailor our product and service offerings to you. Our site uses a variety of technologies that automatically gather anonymous information during your visit. This information relates to the time and date you visited the site; your computer’s IP address; which pages and links you click on; and how you got to our site. We are not able to personally identify you with this data, and we do not track your activity once you have left our site.
Our site features links to third-party websites, such as those of our business partners and social media networks. Liquidity does not control the information practices of third parties, so we advise that you review individual policies before supplying them with personally identifiable information.
Liquidity ensures that our contractors, agents and staff understand the importance of our website visitors’ security and privacy. They are required to protect your information and their access to personal details is restricted to business purposes only. Additionally, we use internal and external resources to review the adequacy of our security procedures.
Notification of changes