We Are Group 3 Technology Affectionately Called G3 Tech

Great Essays
We are Group 3 Technology, affectionately called G3 Tech! We are a technology company that specializes in database design, function, and maintenance, as well as network security and privacy. Our services have been requested by many companies over the years for services including: database reconstruction and redesign for better business efficiency and privacy security assurance.

By accepting these Terms of Service, you are accepting the service of all team members from G3 Tech assigned to this contract. The team members’ names and specialties are listed at the beginning of his document. All services provided by G3 Tech are outlined in accordance with the contract solicited by Flix2You.

1. Acceptance of Service Terms
The Terms of Service
…show more content…
Copyright. G3 Tech Services (i.e. database design, algorithms, codes, software, etc.) are protected by copyright and other intellectual property laws.
b. Trademarks. G3 Tech is a registered trademark of Group 3 Technology.
c. Claims of Copyright Infringement. If you believe that your work has been copied or distributed
7. Governing Law
Group 3 Technology headquarters is in State College, Pennsylvania. Therefore, all Terms of Service are in accordance with the laws of the Commonwealth of Pennsylvania.
8. Use of Information
G3 tech is free to use any company and consumer information, concepts, ideas, techniques, or materials gathered for the sole purpose of this contract. These materials will only be used by G3 tech for the duration of the contact solicited by Flix2You. By agreeing to these terms, you agree to disclose the information necessary to complete the project described in this document.

II. PRIVACY POLICY

This Privacy Policy explains the privacy practices of Group 3 Technology including the collection, use, and disclosure of information gathered for the sole purpose of this contract. Such information can include company or corporate information, user and consumer personal information and preferences, and details regarding technical infrastructure.
1.
…show more content…
5. Security
Physical, technical, and managerial measures are in place to protect any of Flix2You’s sensitive information, while also protecting the sensitive personal information of Flix2You’s consumers. Although these measures are in place, there is not a 100% guarantee that your information is secure. G3 Tech cannot guarantee the security of any information collected and can thereby not be held responsible for any security breech that results in the loss or unwanted copy of information. This policy applies for the duration of the contract and while the redesigned database for Flix2You is in use.
6. Changes to this Privacy Policy
All information provided in this Privacy Policy is updated annually, in harmony with our Terms of Service. Changes may be made to this policy outside of its annual update if deemed necessary. Although this Privacy Policy is nonnegotiable between our companies and only Group 3 Technology can make updates or changes. If your company finds this Policy unsatisfactory in any way, the contract should be rejected or

Related Documents

  • Decent Essays

    Sometimes, a Request for Information (RFI) may be released as a first procurement step to gather information. RFI’s are often released due to drawing discrepancies or if the drawing is lacking critical dimensions and specifications. Based on the Vendor responses to the RFI, the team (PM, Finance, Engineering, Contracts, Procurement) will determine the procurement process that must be followed. The procurement documents must be submitted to corporate for all technology projects and corporate must approve training for State employees. The program contracting office provides final approval.…

    • 477 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Eco/372 Week 1

    • 491 Words
    • 2 Pages

    Based on the organization you have chosen for your final research paper, respond to the following: I. Regulations: If any data involved is regulated, or if there are other legal and compliance concerns, state them in this section. The laws covering the internet are varied and quite complex in the United States with the financial system to the medical system heavily regulated. Starting off the Sarbanes-Oxley was enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures. It was enacted after the high-profile Enron and WorldCom financial scandals of the early 2000s.…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Question 1 -Legal Issue In this discussion, the legal issue is in regards to privacy rights. Currently, policies allow researchers to input information in a database that all organizations and/or researchers can gain access. Therefore, the privacy of the original donors becomes jeopardized because his/ her permission to release his/her information goes beyond the scope of the permission granted by the donors. By having a database that other researchers have entree to violate the donors’ right of privacy.…

    • 1480 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Under the HIPAA Privacy Rule, the two important terms that need to be understood and followed properly include “use” and “disclosure”. The use of PHI involves the information to be utilized and communicated within the healthcare entity. The disclosure of PHI involves the information to be released to an individual or outside entity that follows a request. In general, HIPAA Privacy Rule protect individual’s rights to their PHI and holds covered entities accountable for providing an accounting of disclosures for PHI. With that being said, covered entities need take proper protocols on implementing the best method to track disclosures.…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    It also describes the choices available to you regarding your access to, and how to update and correct, your personal information. How We Collect and Use Personal Information. Client…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    1.Examine the types of decisions financial managers make. How are these decisions related to the primary objective of financial managers? There are three major decisions that financial managers have to take on a regular basis. One of them is the investments decision, the financial manager has to decide where to best invest the funds of the company. It is beneficial for the company to invest their funds to keep growing.…

    • 1110 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Foyle Legal Case Study

    • 509 Words
    • 3 Pages

    Last updated 23 Dec 2016 Foyle Legal is committed to protecting your privacy with your rights and needs in mind. This privacy statement is aimed to provide an outline on how we handle your personal and sensitive information. Your Consent You have no obligation to disclose personal or sensitive information when you visit the Foyle Legal website.…

    • 509 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Facebook Vs Ehling

    • 759 Words
    • 4 Pages

    The advent of the internet and internet communications have brought about a wide range of unresolved questions about the issue of privacy. Many of these issues have only been addressed by the courts on a case-by-case basis; not much legal precedent has been developed that can be applied across the board. Therefore, everyone has to be mindful about their privacy when using the internet for any purpose. I am not surprised that the employers of Souza or Leone read their postings to Facebook and they should not be surprised either. They both willingly put the information out on the internet, which is a public medium.…

    • 759 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    HIPAA Security and Privacy: Cases and Scenarios Brittany Stewart Herzing University Dr. Gary J. Hanney Abstract HIPAA security and privacy is an important aspect of healthcare delivery. Government influences greatly how legal issues are addressed in healthcare, including non-governmental entities. This essay will explain how the HIPAA privacy rule should be applied appropriately with protected health information.…

    • 945 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The International Game Technology (IGT) headquarter in Reno, Nevada is one of the biggest manufacturers / suppliers of slot and lottery machines for the gambling world. This company is “driven by insight, evolving with market needs, and enabled by open technology” (“Six pillars of success”, 2016). IGF uses six pillars to build their achievement on. These pillars are: portfolio, individual games, consumer promotion, retail, logistics & distribution, and interactive. To become “the world 's leading end-to-end gaming company,” (“Who we are”, 2016)…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    These are crucial for some businesses; it helps to estimate the strengths of the company. And provides data for evaluation and helps investors to gain an understanding of company’s predictions. It also gives information to your bankers, suppliers, and…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    I selected Apple as my company for final project Information technology strategic plan (ITSP), in first milestone, I will give the brief overview about the company’s organizational structure, which is developed for Apple based on the IT values, vision and mission statement. Structure and Organization: Apple is an American based multinational company which manufactures electronic devices, software products for the consumers. IPad, IPod, IPhone, Mac books and Macintosh computers are the products manufacture by Apple. ITunes, OS X operating systems are the software’s which are included in products list of Apple.…

    • 905 Words
    • 4 Pages
    Improved Essays