WyreStorm Office

Range of Webcams and Speakerphones to
help make your home office life easier.

 

Last Updated: April 3rd, 2019

This policy explains how WyreStorm Technologies LLC and its affiliated companies collect, use, and share information collected from or about customers when they use one of our websites, download and use mobile apps, and/or contact WyreStorm for purchasing and support.

WyreStorm is dedicated to ensuring that any information collected is used solely for the purpose of conducting company operations and is not shared outside of the organization for any reason other than supporting our customer.

When you use one of our websites/applications or contact us via phone or email agree to the collection, sharing, and use of the information for company use as described in this policy.

 

1. Types of Information We Collect

WyreStorm may collect the following information from you to be used for ordering and/or product support.

Information Provided to Us

Contact and Registration Info such as contact name, company name, address, phone number, email address, username, and password.

Transaction Information for payment of orders such as credit/debit card numbers, delivery address, and any other information related to a purchase/support related transaction.

Product and System Technical Information such as WyreStorm product model numbers, 3rdparty device model numbers, system configuration, and any other information pertaining to the support of our products.

Information We Collect Automatically

WyreStorm does not collect any information automatically from our website and/or mobile apps and software.

Information from Third Party Sources

We may receive information regarding a customer from one of our partners during the course of resolving an issue with one of the products or drivers. This information is kept confidential and is only used for the purpose of supporting the customer.

Contact and Registration Info such as contact name, company name, address, phone number, email address, username, and password.

Product and System Technical Information such as WyreStorm product model numbers, 3rdparty device model numbers, system configuration, and any other information pertaining to the support of our products.

 

2. How We Use Information

Any information we collected is for the sole purpose of conducting company operations. This information may be shared within the company and its partners that handle the shipping and/or support of our products.

Processing of orders for products and parts.

Providing support for products, mobile apps, and software.

Sending of company product and general company announcements and communications.

 

3. How We Share Information

Information collected may be shared with the following for the purpose of performing standard company operations.

Internal departments and partners for processing of orders and providing technical support.

Affiliated companies and third 3rdparty companies whom provide items such as drivers.

 

4. Your Rights and Choices

Communication Preferences and Opt-outs

Any product or company announcement communications may be unsubscribed by following the directions provided in emails received or by contacting WyreStorm.

Mobile Apps and Software

WyreStorm mobile applications and software does not collect any personal information. Only system information is collected but is not stored or shared.

 

5. Location of Information

Information obtained by WyreStorm is stored on 3rdparty services within the cloud with access only by WyreStorm employees. Each one of these services have been verified to follow proper privacy security and do not have access to or the ability to share any personal information that WyreStorm stores on these services.

 

6. How we Protect Information

WyreStorm maintains procedural, technical, and physical safeguards for all information against loss, misuse or unauthorized access, disclosure, alteration, or destruction of information. Procedures are in place to ensure that information is only available to those within WyreStorm whom require access and those with access are held to strict procedures on the use of information.