How We Collect Information.
Form Information. When you complete our online form/application we collect general information about you and your business, such as company name and overall yearly revenues as well as your first and last name. We also may have additional options outside of our apply forms where users can submit information online or over the phone.
Application Information. If you apply for a business loan you will be asked to provide some personal identification information such as a drivers license or similar types of identification. You will also be asked to provide some basic information about your company including proof of ownership and certain financial information and documentation. This information may be provided to third party funding sources in order to complete an application.
Information Collected by Cookies and Web Beacons. We use a variety of technologies to collect information, and this might include sending cookies to your computer or mobile devices. Cookies are small data files that are stored on your hard drive or in device memory by a website. Among other things, cookies support the integrity of our registration process, retain your preferences and account settings, and help evaluate and compile aggregated statistics about user activity. We may also collect information using web beacons. Web beacons are electronic images that may be used in our Services or emails. We may use web beacons to deliver cookies, count visits, understand usage, and determine whether an email has been opened and acted upon.
Visitor Technological Data. We may collect information about your visit to the site such as browser type, device type, pages that you visit, time spent on the site as well as similar data related to you visiting the site. This type of data may be used to improve the usability of the site or alert you about compatibility issues.
How We Use Your Information. We may use your information to assist you in the use of our services such as verifying account information or data that you provide during the application process. We also may use your information to provide you with details about additional programs and services that may be of interest to you and we may communicate with you through email, text, or phone call.
Sharing Information. When you visit our site and submit your information you are providing your consent that we may share the information you provide with third party funding sources in an effort to utilize our services.
We may share your information as a response to subpoenas, court orders, or other types of legal processes to investigate or prevent violations of the terms of our services, or in response to violations of third party funding sources.
We may use your information anonymously combined with other user data for marketing some of our services or programs.
Email Communication. We may provide users that provide email data either through our forms or other types of communication with our company with account updates or offers about our programs or services. All users will have the opportunity to remove their emails from our communication list.
California Privacy Rights. California Civil Code Section 1798.83, also known as the “Shine The Light” law, allows our customers who are California residents to request and receive from us once a year, at no cost, information about the personal information (if any) we disclosed to third parties for direct marketing purposes in the preceding calendar year. If you are a California resident and would like to make this type of request, please submit your request to [email protected]. In your request, please demonstrate to the fact that you are a California resident and provide a current California address for our response. Please be aware that not all information sharing is covered by the California Privacy Rights requirements and only information on covered sharing will be included in our response.
Internet Security. We take several steps to ensure the security and protect your personal information with measures such as SSL encryption as well as authentication procedures in an effort to secure that data from theft, fraud or misuse. Security of your personal information is a priority to us but you acknowledge that no system can be completely secure.
We can be reached via e-mail at [email protected]