If you receive our Services through the Third Party Alarm Company or if you subscribe for mobile application Services provided by Alarm.com or other services provided by an independent business partner, the Third Party Alarm Company or other third party is responsible to you for the lawful collection, use, and protection of your personal information. We encourage you to review the privacy practices of the Third Party Alarm Company or other third-party provider before providing your personal information to that company.
The Personal Information We Collect
The types and sources of personal information we receive or collect will depend on how you interact with Vector and may include any of the following.
Personal Information About Vector Customers:
Personal Information for Customers of Third-Party Alarm Companies:
Information Collected Automatically from Visits to Our Sites:
We use first-party and third-party cookies, pixels, and other internet technologies to collect information including:
Please note that you can restrict some automated collection of user, device, and tracking data collected using cookies and other internet technologies. For more information about automated data collection, see “How We Use and How You Can Restrict Local Storage, Cookies and Other Internet Technologies”.
Other Sources of Personal Information:
The Purposes for Collecting Personal Information
Disclosure of Personal Information to Third Parties
We allow authorized third parties to collect or access your personal information when there is a legitimate business reason to do so. Third parties with access to personal information are authorized to use the personal information as necessary to provide services to us or directly to you and, at a minimum, are required to protect the confidentiality of that personal information as required by legal or professional obligations (except for first responders, as explained below). Third parties who may collect or have access to your personal information include:
How We Use and How You Can Restrict Local Storage, Cookies and Other Internet Technologies
Our Sites use common browser local storage technologies, including cookies, to manage your identity, store your preferences, and track how you interact with us. Cookies also enable us to determine when you have not completed a shopping cart purchase on our Sites. We will only keep cookies for as long as necessary to achieve the relevant purposes for which we use them.
You can control how local storage works in the settings or tools offered on your internet browser, including denying some capabilities. Most browsers have an option for limiting or restricting cookies, which will prevent your browser from accepting new cookies, and may allow you to decide on acceptance of each new cookie in a variety of ways. You can also delete all cookies that are already on your device. If you do this, however, it may impact the overall functionality of some features of the Sites and Services. You can also visit the link below for an overview of how to block or delete cookies on the most common browsers: http://www.allaboutcookies.org.
Most browsers automatically accept cookies, but this is typically something you can adjust. Information for each browser can be found in the links below:
We may use several types of cookies on our Sites:
Necessary cookies are essential for the Sites to function and cannot be switched off in our systems. These cookies do not store your name, e-mail or phone number, IP address or device identifier, or other directly identifying personal information and are deleted when you close your browser.
Functional cookies are set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in if you have an account we manage, or filling in forms. You can set your browser to alert you about these cookies, but some parts of the Sites will not work if you block these cookies.
Digital advertising and social media cookies Our site may also include social media features, such as the Facebook, LinkedIn, and Twitter buttons and widgets, or web-tracking technologies that run on our Sites. These features may collect your IP address, which page you are visiting on our Sites, and may set a cookie to enable the feature to function properly. Social media features and widgets are either hosted by a third party or hosted directly on our Sites. Your interactions with these features are governed by the privacy statement of the company providing it.
We do not disclose any directly identifying personal information to data analytics or advertising providers. However, we may partner with websites and social media platforms that monitor a user’s visits to our Sites, collect and aggregate data about the user’s visit with data collected on other websites or apps, and use the aggregated findings for its own commercial purposes or to correlate the data to an identifiable individual, in which case the processing of personal information will be the responsibility of the provider. For information about how Google collects data on partner sites, see here.
Google Analytics We employ Google Analytics internet tools to collect information about usage of our Sites. Google Analytics collects the IP address assigned to you or device identifier on the date you visit our Site. The Google Analytics tools do not identify or collect your name, e-mail address, or other directly identifying information.
Google Analytics tools also collect specific visitor cookie data, such as the source, medium, and keywords used to visit the Sites, and other information, such as how often users visit the Sites, what pages they visit when they do so, and what other websites they used prior to coming to the Sites. Although Google Analytics creates a cookie to identify you as a unique user the next time you visit the Sites, the cookie cannot be used by anyone but Google.
For specific information about how Google Analytics may be used to track your Personal Information and how to restrict it, please see Google’s privacy practices website. To opt out of being tracked by Google Analytics across all websites, visit https://tools.google.com/dlpage/gaoptout.
Safeguarding Personal Information
Vector uses reasonable technical, operational, and administrative measures to safeguard your personal information in a manner that is commensurate with the sensitivity of such personal information. Unfortunately, no form of storage or transmission is completely secure. We cannot guarantee the security of the personal information you submit to us or collect automatically when you use our Sites and do not accept liability for unintentional disclosure.
It is important that you use reasonable precautions to protect your personal information by not disclosing or sharing your individual password (even with other individuals in your organization) and by logging out of your account when you have completed each working session. If you have reason to believe that your personal information has been compromised as a result of the Sites or Services, please contact us immediately as set forth below under “Contact Information.”
We want to remind you that email is not secure against interception. If you submit credit card information and/or EFT/ACH information online, please do not provide your information via unsecured e-mail, general fax, or general voicemail. Below are more secure methods for you to provide credit card information and/or EFT/ACH information:
i. Through our secure payment portal available at www.vectorsecurity.com/customer/login;
ii. Speak live with a Vector Security representative; or
iii. Provide via encrypted email.
Vector strongly encourages consumers and other customers with access to the payment portal identified in (i) above to make payment(s) through such payment portal. For further information about Vector’s safeguarding of credit card, electronic funds transfer, and automated clearing house transactions, please contact us as set forth below under “Contact Information.”
You are responsible for choosing a secure username and password when you set up a payment portal account and should take precautions to keep your username and password confidential. Some precautions include, among others: (1) choosing a password that you do not use on any other online account; (2) not sharing your password with anyone, including anyone who claims to work for us; (3) changing your password from time to time; and (4) protecting your computer and mobile devices against unauthorized access.
Accuracy and Accessing Your Personal Information
It is important that the personal information Vector holds about you is accurate and current. You are responsible for informing Vector of changes to such information. You can update or correct your alert contact list and billing information using your Vector online account or by contacting your local Vector branch office. For other account changes, please contact your local Vector branch office. If you do not know your local Vector branch office please visit www.vectorsecurity.com to search by zip code or click on the Locations tab to view a list of all Vector offices. We will make reasonable efforts to modify your information promptly in our records.
Retention of Your Personal Information
We will retain your personal information as long as your customer account is active; as needed to provide you with access to the payment portal; as necessary to comply with our legal obligations, to implement our document retention policy, resolve disputes, and enforce our agreements; and for marketing purposes.
Third-Party Websites, Mobile Applications, Social Media and Links
Your use of the “Text Us” feature on our Site is subject to the terms of Podium, which is our service provider for the feature. Their terms are linked in the feature and can be found here: https://legal.podium.com/#aup-us.
Your Communications Choices.
E-mail marketing and advertising. You can opt-out of receiving marketing communications from us by following the “unsubscribe” instructions included in each of our e-mail marketing communications. You can also opt-out by emailing us at the address provided under “Contact Information” below. and providing the names/email address that you want us to remove from our marketing database and add to our ‘Do Not Contact’ list. If you opt-out of marketing messages, we may still send e-mails to you that involve your account or responses to your questions. It may take up to ten days to process your request to unsubscribe from e-mail marketing messages.
Text messages. If you previously gave us permission to send recurring automated promotional and personalized marketing communications to you by text message, you can withdraw that consent at any time by replying STOP to our text message. It may take up to seven days to process your request to STOP text marketing messages.
Any modifications to this Privacy Notice will be effective upon our posting of the new terms and/or upon implementation of the new changes (or as otherwise indicated at the time of posting). In all cases, your continued use of our products or services after the posting of any modified Privacy Notice indicates your acceptance of the terms of the modified Privacy Notice.
California Residents: Your California Privacy Rights
Your Rights under the CCPA. If you are a California resident, you have the right to make requests about your personal information rights as provided in the CCPA (“Consumer Request”) and summarized below.
Right to Request Access. You can request to know the following about your personal information we have collected about you:
Request Deletion. You have the right to request that we delete personal information which we have about you, subject to a range of exclusions permitted by law. We are not required to delete personal information if it is necessary to complete a transaction, used reasonably for an ongoing business relationship, or used internally in a lawful manner that is compatible with the context in which you provided the information.
We will confirm receipt of your request within ten (10) days and follow appropriate procedures to verify the identity and authority of the person submitting the request. If your request to delete information is verified, we will delete (and direct our service providers and contractors to delete) all or part of the requested personal information from our (and their) records, unless an exclusion applies. If we are unable to fulfill all or part of your request, we will let you know why (for example, if we have a permitted reason to retain certain information if the identity of the requesting person cannot be verified). For technical reasons and to maintain anonymous business statistics, we may de-identify (anonymize) personal information rather than erase it completely from our systems. We do not delete or de-identify job applicant information except where required by law.
The process by which we verify and respond to your requests is explained below under “How to Submit and How We Verify a Request.”
Right to Designate an Authorized Agent. California consumers have the right to designate an authorized agent to act on their behalf to submit a personal information access request or a request for deletion of personal information. An authorized agent may be a natural person or a business entity registered with the Secretary of State. An authorized agent must also submit to us written proof of their authorization to act on the consumer’s behalf.
Request to Opt-Out from Selling or Sharing Personal Information for Targeted Advertising. Vector does not sell personal information or share personal information collected from your usage of our Sites with third parties for targeted advertising purposes.
How to Submit and How We Verify a Request. You may submit a Consumer Request by contacting us in any of the following ways:
Vector Security, Inc.
2000 Ericsson Drive
Warrendale, PA 15086
To verify certain requests, we may need to verify your identity by confirming information we have on file for you, including email address, phone number, full name, address and other personal information. If you make a request on behalf of someone else, we will need to verify your authority to make that request. We reserve the right to deny a consumer request if the identity or authority of the requesting party cannot be confirmed. Only you, or someone legally authorized to act on your behalf, may make a Consumer Request related to your personal information. We may require written proof of an agent’s permission to make a request on your behalf, and we may need to verify your identity directly.
How We Respond to Consumer Requests. We will confirm receipt of your Consumer Request within ten (10) business days and may request additional information necessary to verify that you are authorized to make the request. We will respond to any verifiable consumer request within forty-five (45) calendar days of receiving it, subject to delays and exclusions as permitted by law. If we require more time to respond, we will let you know the reason why and the extension period in writing. If you have an account with us, we may respond via that account. Otherwise, we will use the email address or U.S. Postal address you provided to us when making the request.
If we cannot comply with all or part of your request, we will explain the reasons why. For data portability requests, we will select a format to provide your personal information that is readily useable and should allow you to transmit the information readily from one entity to another entity.
We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request. We will not discriminate against you if you make a request about your personal information.
Exercising your CCPA Rights. To learn more about the how to exercise your CCPA rights, please see “Requests About Your Personal Information- How to Submit and How We Verify a Consumer Request.” Please note that you may only submit a request to know twice within a 12-month period. We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you. We are legally required to verify your identity before we can fulfil your or your authorized agent’s Consumer Request.
Financial Incentive Programs. We may offer you certain financial incentives permitted by the California law to encourage consumers to provide personal information. These incentives may result in different prices, rates, or quality levels of products or services if reasonably related to the value of your personal information and contain written terms that describe the program's material aspects. Participation in a financial incentive program requires your prior opt-in consent, which you may revoke at any time. Vector does not currently offer financial incentive programs.
California Rights under “Shine the Light” Law. California residents may request a list of the types of customer information we provided to third parties for their direct marketing purposes and the names and addresses of all third parties with which we have shared such information during the past calendar year. We will provide the information to you free of charge within 30 days of your request. To request that we provide you with such information, please send a written request to email@example.com. Within thirty (30) days of receiving your request, we will provide you with the information at the address you designate in your request, which may be an email address or physical address.