(Updated June 12 2015)
Cloudcom stores personal information in order to deliver our services in the best possible way for our customers. We know that you care of how your informations is handled and therefore we take your privacy very seriously.
Information gathering and usage
We gather various types of Personal Information from our users and others, and we use this Personal Information internally in connection with our Services. For example your Personal Information is used to provide, monitor and improve our Services, to contact you and allow other users to contact you through the Services, to respond to customer care and other inquiries, to process and fulfill your requests for certain products and services, and to analyze how you use the Services. In certain cases, we may also share some Personal Information with third parties.
We are the sole owners of the information collected on this site. In connection with your use of the Services, we may also collect information created or provided by you, or that we otherwise receive, in connection therewith. We will not sell or rent this information to anyone.
Your Access to and Control Over Information
Through your account settings, you may access, and, in some cases, edit or delete the information you’ve provided to us.
The information you can view, update, and delete may change as the Services change. If you have any questions about viewing or updating information we have on file about you, please contact us at firstname.lastname@example.org.
Your account is protected by Google Authentication for your privacy and security. You must prevent unauthorized access to your account and Personal Information by selecting and protecting your Google account appropriately and limiting access to your computer or device and browser by signing off after you have finished accessing your account.
We endeavor to protect the privacy of your account and other Personal Information we hold in our records, but unfortunately, we cannot guarantee complete security. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time.