The privacy principles of www.3ms.ee are disclosed in this privacy notice. This applies only to information gathered in this homepage and to how it is used and with whom it may be shared, what is the information accessible to you about the usage of your data, security measures which protect the misuse of your information and how you can correct the inaccuracies of the information.
1. Gathering and sharing of data
We are the sole owners of the information gathered on this homepage. We only have access to the gathered information that you send to us voluntarily via e-mail or via other direct contact. We do not sell or rent this information. We use the information related to you to answer your question which made you contact us. We do not share the information related to you with third parties outside our organisation, except if it is necessary to perform your request. We may contact you via e-mail in the future to notify you of special offers, new products or services or amendments of these privacy conditions, except when you have expressed your wish that you do not want us to do that.
2. Your access over information
You are welcome to contact us any time via the e-mail address of the customer service presented on our homepage or by phone and ask which personal data we have on you. If you wish, we will amend, correct or delete all of the data related to you. You can amend, correct and delete your data yourself by logging into your account.
3. Security and data protection
We use precautionary measures to protect your information. If you have forwarded sensitive information via our homepage, this information is protected online as well offline. Upon gathering sensitive information, this information is encrypted and sent to us securely. You can check this by looking for a lock icon on the address bar and the letter combination “https” at the beginning of the website address. Although we use encryption to protect the sensitive information forwarded online, we also protect your information offline. Only employees who need information for performing a specific work (for example, invoicing or customer service) have access to identifying data of the person. Computers and servers where we store identifying data of the person are always kept in a secure environment.