INTRODUCTION
Welcome to Astral Logistics Solutions, where we prioritize the secure handling of your transportation needs. As a leading trucking company, we uphold the highest standards of privacy and confidentiality in all aspects of our operations. Our commitment to safeguarding your data and information is integral to our service ethos. Rest assured, your trust in Astral Logistics Solutions is our paramount concern.
No mobile information will be shared with third parties/affiliates for marketing/promotional purposes. All other categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties.
By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. You can reply STOP to opt-out of further messaging.
DATA COLLECTED
Personal Information:
– Contact Information: Name, email address, phone number, and postal address.
– Identification Data: Government-issued ID numbers or driver’s license information.
– Payment Details: Credit card information or bank account details for billing purposes.
– Account Credentials: Username, password, and security questions for account access.
– Employment History: Details provided by job applicants or employees for recruitment purposes.
Usage Data:
– Device Information: IP address, device type, browser type, operating system, and mobile device identifiers.
– Log Data: Website usage statistics, pages visited, referral URLs, and timestamps of interactions.
– Location Data: Approximate location based on IP address or precise location with user consent.
– Session Information: Duration of visits, session IDs, and activities performed during sessions.
Cookies and Tracking Technologies:
– Cookies: Small text files stored on your device to enhance website functionality and user experience.
– Web Beacons: Electronic images used to track website visitors and gather analytics data.
– Pixel Tags: Invisible tags embedded in webpages or emails to track user behavior and engagement.
– Other Tracking Technologies: Local storage, server logs, and similar technologies for data collection and analysis.
We collect this information to provide and improve our services, personalize user experiences, and ensure the security of our platform. Your data is treated with the utmost confidentiality and used only for legitimate business purposes outlined in our privacy policy.
DATA COLLECTED
Personal Information:
– Contact Information: Name, email address, phone number, and postal address.
– Identification Data: Government-issued ID numbers or driver’s license information.
– Payment Details: Credit card information or bank account details for billing purposes.
– Account Credentials: Username, password, and security questions for account access.
– Employment History: Details provided by job applicants or employees for recruitment purposes.
Usage Data:
– Device Information: IP address, device type, browser type, operating system, and mobile device identifiers.
– Log Data: Website usage statistics, pages visited, referral URLs, and timestamps of interactions.
– Location Data: Approximate location based on IP address or precise location with user consent.
– Session Information: Duration of visits, session IDs, and activities performed during sessions.
Cookies and Tracking Technologies:
– Cookies: Small text files stored on your device to enhance website functionality and user experience.
– Web Beacons: Electronic images used to track website visitors and gather analytics data.
– Pixel Tags: Invisible tags embedded in webpages or emails to track user behavior and engagement.
– Other Tracking Technologies: Local storage, server logs, and similar technologies for data collection and analysis.
We collect this information to provide and improve our services, personalize user experiences, and ensure the security of our platform. Your data is treated with the utmost confidentiality and used only for legitimate business purposes outlined in our privacy policy.
DATA COLLECTED
Personal Information:
– Contact Information: Name, email address, phone number, and postal address.
– Identification Data: Government-issued ID numbers or driver’s license information.
– Payment Details: Credit card information or bank account details for billing purposes.
– Account Credentials: Username, password, and security questions for account access.
– Employment History: Details provided by job applicants or employees for recruitment purposes.
Usage Data:
– Device Information: IP address, device type, browser type, operating system, and mobile device identifiers.
– Log Data: Website usage statistics, pages visited, referral URLs, and timestamps of interactions.
– Location Data: Approximate location based on IP address or precise location with user consent.
– Session Information: Duration of visits, session IDs, and activities performed during sessions.
Cookies and Tracking Technologies:
– Cookies: Small text files stored on your device to enhance website functionality and user experience.
– Web Beacons: Electronic images used to track website visitors and gather analytics data.
– Pixel Tags: Invisible tags embedded in webpages or emails to track user behavior and engagement.
– Other Tracking Technologies: Local storage, server logs, and similar technologies for data collection and analysis.
We collect this information to provide and improve our services, personalize user experiences, and ensure the security of our platform. Your data is treated with the utmost confidentiality and used only for legitimate business purposes outlined in our privacy policy.
Information sharing and disclosure
A. Third-Party Involvement:
-No mobile information will be shared with third parties/affiliates/partners for marketing/promotional purposes. All other categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties.
B. Legal Compliance:
– Regulatory Requirements: Disclosure of information as mandated by applicable laws, regulations, or legal processes, such as subpoenas, court orders, or government inquiries.
– Protection of Rights: Sharing data to protect our rights, property, or safety, or those of our users, employees, or the public, in compliance with legal obligations.
– Fraud Prevention: Sharing information to prevent fraud, unauthorized transactions, or other illegal activities, including sharing with law enforcement agencies or fraud prevention entities.
C. Business Transfers:
– Merger or Acquisition: Transfer of data in the event of a merger, acquisition, or sale of assets, where your information may be disclosed to potential buyers or investors as part of due diligence processes.
– Corporate Restructuring: Sharing data with affiliates, subsidiaries, or parent companies in the context of corporate reorganization or restructuring efforts.
– User Notification: Informing users of any changes in ownership or control of their personal data and providing choices regarding the handling of their information in such scenarios.
Your Rights and choices
A. Access and Modification:
– Right to Access: Request access to the personal data we hold about you, including information on its processing purposes, categories of data, recipients, and storage duration.
– Data Modification: Request correction, updating, or deletion of inaccurate or outdated personal information in our possession, subject to verification and legal constraints.
B. Opt-Out:
– Communication Preferences: Opt-out of receiving marketing communications, promotional materials, or newsletters from Astral Logistics Solutions by adjusting your communication preferences in your account settings or contacting our support team.
– Cookies and Tracking: Manage your cookie preferences through browser settings or opt-out mechanisms provided by third-party tracking technologies, though opting out may impact website functionality.
C. Data Control:
– Data Retention: Specify preferences for data retention and deletion, subject to legal obligations and legitimate business needs, by contacting us directly to request erasure of your personal information.
– Consent Withdrawal: Withdraw consent previously provided for the processing of your personal data, where applicable, by contacting us or adjusting your account settings accordingly.
D. Privacy Rights Under Applicable Laws:
– Additional Rights: Exercise any additional rights granted to you under applicable data protection laws, such as the right to data portability, restriction of processing, or objection to processing based on legitimate interests or automated decision-making.
– Submission of Requests: Submit requests regarding your privacy rights by contacting our designated privacy officer or submitting a formal request through our website or designated channels.
WHO HAS ACCESS TO YOUR DATA
If you are not a registered client for our site, there is no personal information we can retain or view regarding yourself.
If you are a client with a registered account, your personal information can be accessed by:
– Our system administrators.
– Our supporters when they (in order to provide support) need to get the information about the client accounts and access.
Data Security
A. Measures to Protect Your Information:
– Encryption: We utilize industry-standard encryption protocols to safeguard data transmission and storage, ensuring confidentiality and integrity.
– Access Controls: We implement strict access controls and authentication mechanisms to limit access to personal information only to authorized personnel.
– Secure Infrastructure: Our infrastructure includes deployment of secure server configurations, firewalls, and intrusion detection systems to protect against unauthorized access and cyber threats.
– Regular Audits: We conduct regular security audits, vulnerability assessments, and penetration testing to proactively identify and address potential security vulnerabilities.
B. Incident Response Procedures:
– Incident Monitoring: We continuously monitor our systems and networks for suspicious activities, unauthorized access attempts, or data breaches.
– Response Team: Our incident response team comprises trained personnel who promptly investigate and mitigate security incidents.
– Notification Protocols: We have clear procedures in place for notifying affected individuals, regulatory authorities, and other relevant stakeholders in the event of a data breach or security incident.
– Remediation Measures: We implement corrective actions, such as patching vulnerabilities, enhancing security controls, and providing necessary support to affected individuals, to minimize the impact of security incidents and prevent future occurrences.
C. Employee Training and Awareness:
– Training Programs: We provide comprehensive training programs to educate employees about their roles and responsibilities in protecting sensitive information and preventing security breaches.
– Awareness Campaigns: Regular dissemination of security awareness materials, including policies, guidelines, and best practices, promotes a culture of security consciousness and compliance among staff members.
– Incident Reporting: We encourage employees to promptly report any security incidents, data breaches, or suspicious activities to the appropriate authorities for immediate action and resolution.
Children Policy
A. Our Policy Regarding Minors:
– Age Requirement: Our services are intended for individuals of legal age as defined by applicable laws and regulations. However, this policy does not apply to minors under the specified age limit, as outlined in the carveout provided in the website updates section.
B. Collection of Information from Minors:
– Parental Consent: Verifiable parental consent is required before collecting personal information from minors, in compliance with relevant data protection laws.
– Limited Collection: We limit data collection from minors to only what is necessary for providing age-appropriate services and complying with legal obligations.
C. Parental Rights and Controls:
– Parental Access: We provide mechanisms for parents or legal guardians to access, review, and request deletion of personal information collected from their children.
– Control Options: Parents are offered parental controls and settings allowing them to manage their child’s account, preferences, and interactions with our platform.
– D. Educational Resources:
– Information for Parents: We provide educational resources and guidance for parents and guardians on protecting their children’s privacy online and supervising their digital activities.
– *Awareness Campaigns:* We participate in initiatives to raise awareness about children’s online privacy rights and best practices for ensuring a safe and secure online environment for minors.
AMENDMENTS
We may amend this Privacy Policy from time to time. When we amend this Privacy Policy, we will update this page accordingly and require you to accept the amendments in order to be permitted to continue using our services.