We built Vetter to make it easy to gather and contribute ideas with your company, team, or organization. Your privacy and security is our top priority. You can choose what to say and share with your members in Vetter, but we want you to know that no one outside of your team will be able to access that private and sensitive information.
Vetter IMS Corp. ("Vetter") owns and runs www.getvetter.com (the "Website"), through which it offers various services and software (the Website, services and software are referred to as the "Services").
When you register for Vetter we may ask for information such as your name, company name, email address, credit card information. Vetter uses collected information for the following general purposes: products and services provision, billing, identification and authentication, services improvement, contact, and research.
The information we collect is used to improve the content of our Web pages and the quality of our service, and is not shared with or sold to other organizations for commercial purposes, except to provide products or services you've requested, when we have your permission, or under the following circumstances:
Vetter takes appropriate precautions to protect our users' information. Your information is located on secure servers and encrypted using secure socket layer technology (SSL).
By using Vetter to gather and manage your ideas, you consent to the storage of your data on the Vetter application.
The Vetter app and its data are hosted/stored securely by Amazon Web Service (AWS). AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s AWS infrastructure is housed in Amazon-controlled data centers throughout the world. Only those within Amazon who have a legitimate business need to have such information know the actual location of these data centers, and the data centers themselves are secured with a variety of physical controls to prevent unauthorized access. More information can be found at the AWS Security and Privacy Center: https://aws.amazon.com/security/
Access to Customer Data (such as Ideas, Challenges, Comments) is primarily by encrypted passwords which the Customer alone controls. The Hosted Service Provider is not provided with access to Customer Data.
Databases containing Customer Data are maintained by Vetter's technical support staff who have contractually undertaken to keep the Customer Data confidential and who are trained to follow documented procedures for the protection of Customer Data privacy. Vetter's technical support staff may access Customer Data using Vetter controlled administrative passwords only in limited, controlled and documented circumstances which include customer technical support requests, return of Customer Data upon termination of service, or as ordered by a Court of competent jurisdiction. Vetter’s administrative passwords are supervised by Vetter's Security Administrator and are changed periodically and upon changes of technical support staff.
Customer Data remains the property and responsibility of the Customer. Upon termination of service, Vetter will return the Customer Data to the Customer at no charge. Data collected through Vetter accounts is owned solely by the customer/owner of that account. By default, the data is only accessible by providing a username and password and logging into the site.
We use an outside credit card processing company to bill you for goods and services. These companies do not retain, share, store or use personally identifiable information for any other purposes.
We use this information, which does not identify individual users, to analyze trends, to administer the site, to track users' movements around the site and to gather demographic information about our user base as a whole.
IP addresses are tied to personally identifiable information to identify the country of origin of the user. This information is used to facilitate the use of the service and our multi-lingual options.
Vetter may disclose personally identifiable information under special circumstances, such as to comply with subpoenas or when your actions violate the Terms of Service. It may be necessary to share information in order to investigate, prevent, or take action regarding suspected or actual illegal activities, including without limitation, fraud, situations involving potential threats to the physical safety of any person, or as otherwise permitted or required by law.CHANGES
Vetter may periodically update this policy. We will notify you about significant changes in the way we treat personal information by sending a notice to the email address on your Vetter account or by placing a prominent notice on our site.QUESTIONS
Healther Saunders; ECITB Product Dev. ManagerSee pricing