Privacy Policy

Effective date: 2/15/2016   |   Updated: 05/06/2026

 

Scope

All vendors, customers, employees, contractors, consultants, temporary and other workers at IT Convergence must adhere to this policy. This policy applies to all IT Convergence personnel, equipment, networks (both the perimeter and the infrastructure), and the parties with which we do business.

This Privacy Policy also applies to www.itconvergence.com, owned and operated by IT Convergence. This Privacy Policy describes how IT Convergence collects, uses, shares and secures the personal information provided. It also describes user choices regarding use, access and correction of your personal information.

The IT Convergence websites give you the option to submit personal information to IT Convergence and its affiliates. IT Convergence is respectful of personal data and doesn’t share it with third parties.

 

Policy Statement

Our company has access to many assets. These assets are information, which is critical to doing business, retaining the trust of our customers, and continued success in the IT Industry. This policy outlines our commitments to our employees, customers, and to our future regarding how we will handle this information.

 

Purpose

Information can be sensitive by its nature, and can also be sensitive due to regulations and industry standards. The types of sensitive information can include:

  • Customer information (both for customer companies and for people as individuals)
  • Financial information, including credit cards, salaries, banking, transactions and more
  • Medical information of all types
  • Company patents, business plans, and other intellectual property
  • Company business records and planning materials, including our customer list, marketing and sales efforts, product line plans, and more.
  • Copyrighted materials, both which our company creates and those which we obtain under license from others

This information may reside on our computing systems or backup devices, may traverse the networks, be on paper, or be in people’s minds. All locations must be properly controlled. The rules by which information is handled are determined by the regulations, business requirements, and company commitments relating to that type of information. Put together, these are called the significance of the information.

Every employee, vendor, contractor, supplier or vendor, agent or representative of our company must be
aware of the significance of the information being handled, and ensure that proper controls are applied to
prevent copying, disclosure, or other misuse of the information.

 

Policy Sections

 

1. Information Protection

This is a part of the overall security and privacy effort of our company. Other policies and controls may also apply, as issued by the Human Resources, Delivery Assurance, and Security teams. These are available in the employee handbook, or on the company’s intranet or internet sites. Penalties for violating these policies may include disciplinary actions up to termination of employment, or termination of the business relationship with our company.

Our company relies upon employees and business partners to properly develop, maintain, and operate our systems, networks, and processes which keep our sensitive information safe and properly used. This means that every person and organization handling our information has the responsibility to keep the information safe, no matter where the information is located. This includes computing systems, networks, paper copies, business processes, and verbal transmission of information.

Our company’s policy:

  • We will meet all applicable requirements in properly protecting the information, including:
    • Laws
    • Regulations
    • Industry standards
    • Contractual commitments
  • The protections we apply to information assets will be in proportion to the value and
    sensitivity of the information, and will balance the sensitivity of the information against:

    • The cost of controls
    • The impact of the controls on the effectiveness of business operations
    • The risks of disclosure, modification, destruction, or unauthorized use of the information
  • We will protect all types of sensitive information, including but not limited to:
    • Medical
    • Financial
    • Credit
    • Business transaction and planning
    • Personal information, both of our employees and of our customers
  • We will ensure that these controls are accepted by all employees, vendors, service providers, representatives and associates of our company who may have access to our information. This includes ensuring that all personnel at all levels are aware of, and are held accountable for safeguarding information assets.
  • We will ensure that access to information is controlled, and based upon, job function and need-to-know criteria.
  • We will maintain proper business continuity and security procedures, including information systems, networks, resources, and business processes.
  • We will report any suspected or actual breach of these policies, and will cooperate with investigative agencies.
  • We will comply with other, related policies, including the Company’s privacy policies.

 

2. Privacy Policy for Employees

Our company values each employee, and so has a commitment to protect the personal information which we handle on behalf of the employee.

It is our policy that:

  • Our company will collect only that information about employees which is needed and relevant.
  • Our company will strive to make certain that personal information about employees is kept accurate and up-to-date.
  • Our company will use appropriate controls to ensure that this information is kept secure, and is only viewed or used by the proper personnel.
  • Our company will use appropriate controls to ensure that this information is kept secure, and is only viewed or used by thInformation about employees will not be disclosed to any external parties unless appropriate.
  • Employees will be told how they can review information about them, make updates, and report problems.
  • Our company will comply with applicable laws, regulations, and industry standards when protecting employee information.
  • We hold our employees, vendors, contractors, suppliers, and trading partners to meet this same set of policies.

 

3. Privacy Policy for Customers

As part of our company’s core values, we will properly value and protect any information entrusted to us about our customers. This policy describes how we will safeguard personal and company information, to ensure peace of mind when dealing with our company.

It is our policy that:

  • Our company will collect only that information about customers which is needed and relevant.
  • Our company will not disclose information to other parties unless customers have been properly notified of such a disclosure.
  • Our company will strive to make certain that information about customers is kept accurate and up-to-date.
  • Our company will use appropriate controls to ensure that this information is kept secure, and is only viewed or used by the proper personnel.
  • Our company will comply with applicable laws, regulations, and industry standards when protecting employee information.
  • We hold our employees, vendors, contractors, suppliers, and trading partners to meet this same set of policies.
  • ITC does not, in the course of routine business, sell any data or information of any person, organization, or party.

 

4. Data Collection

The ways in which we collect and use personal data, in addition to information collected in the course of business with our contracted clients [which is managed by the Master Services Agreement (MSA) and/or Terms and Conditions on file during the contracted period], include:

  • Contact us forms
    If you wish to receive additional information about us, you have the option of filling the “Contact us” form. Personal Information requested is: Name, Company, Phone, and e-mail. We request this information in order to be able to contact you to reply to your inquiries
  • E-mail to a friend
    By providing your friend’s e-mail, name and your name and email we send a link with information to your friend. When you provide us with your friend’s personal information, we will only use this information for the specific reason for which it is provided. If you believe that one of your contacts has provided us with your personal information and you would like to request that it be removed from our database, please contact us at info@itconvergence.com.
  • Sending your Resume
    Send us your Resume as stated in the Careers section in order to apply for a job with IT Convergence.
  • Passive Collection
    As is true of most websites, we gather certain information automatically. This information may include Internet protocol (IP) addresses, browser type, Internet service provider (ISP), referring/exit pages, the files viewed on our site (e.g., HTML pages, graphics, etc.), operating system, date/time stamp, and/or clickstream data to analyze trends in the aggregate and administer the site.
  • Tracking Technologies
    IT Convergence and its partners use cookies or similar technologies to analyze trends, administer the website, track users’ movements around the website, and to gather demographic information about our user base as a whole. You can control the use of cookies at the individual browser level, but if you choose to disable cookies, it may limit your use of certain features or functions on our website or service.

 

5. IT Convergence’s Role as a Service Provider

The use of information collected through our service shall be limited to the purpose of providing the service for which the Client has engaged IT Convergence and in association with the Master Services Agreement (MSA) or Terms and Conditions on file between IT Convergence and Client.

IT Convergence collects information under the direction of its Clients, and has no direct relationship with the individuals whose personal data it processes. If you are a customer of one of ITC’s Clients and would no longer like to be contacted by one of ITC’s Clients, please contact the Client that you interact with directly. We may transfer personal information to companies that help us provide our service. Transfers to subsequent third parties are covered by the service agreements with our Clients.

IT Convergence acknowledges that you have the right to access your personal information. IT Convergence has no direct relationship with the individuals whose personal data it processes. An individual who seeks access, or who seeks to correct, amend, or delete inaccurate data should direct their query to the IT Convergence’s Client (the data controller). If requested to remove data we will respond within a reasonable timeframe. In certain circumstances we may be required by law to retain your personal information, or may need to retain your personal information in order to continue providing a service.

 

6. ITC as a Data Processor

In the provision of Managed Services, Private and Cloud Hosting (OCI), and Professional Services to its clients, ITC acts primarily as a Data Processor. In these instances, ITC processes personal data solely on behalf of and according to the instructions of the client (the Data Controller). ITC’s obligations regarding this data are further governed by the specific Data Processing Agreement (DPA) executed with each client.

6.1 Use of Sub-Processors: ITC utilizes third-party service providers (Sub-processors) to assist in providing Managed Services and Infrastructure (e.g., Oracle Cloud Infrastructure, LevelBlue Security). ITC conducts security and privacy assessments of all Sub-processors and maintains written agreements ensuring they provide a level of data protection consistent with this policy. A current list of Sub-processors is available to Clients upon request.

As a Processor, ITC is not responsible for the legal basis of collection or the specific content of data provided by the Client.

6.2 Data Subject Rights & International Transfers

6.2.1 Individual Rights: Under applicable privacy laws (including GDPR and CCPA/CPRA), individuals whose data is processed by ITC have the following rights:

  • Right to Access: The right to request copies of your personal data.
  • Right to Erasure: The right to request that ITC erase your personal data under certain conditions.
  • Right to Portability: The right to request that ITC transfer your data to another organization
  • Right to Rectification: The right to request that ITC correct any information you believe is inaccurate.

6.2.2 Note on Client Data: Where ITC acts as a Data Processor, requests regarding these rights should be directed to the respective Data Controller (the Client). ITC will assist the Client in fulfilling these requests as per the terms of our DPA.

6.2.3 International Data Transfers: ITC may transfer personal data to countries outside of your country of residence, if requested by the Data Controller or as agreed to provide support services. ITC ensures such transfers are conducted using legally recognized transfer mechanisms, such as Standard Contractual Clauses (SCCs) or the Data Privacy Framework (DPF), to ensure a level of protection equivalent to that of the origin country.

 

7. Sharing with Service Providers

We may share your information with third parties who provide services on our behalf to help with our business activities. These companies are authorized to use your personal information only as necessary to provide these services to us.

These services may include:

  • Fulfilling orders and delivering packages
  • Providing customer service
  • Sending marketing communications
  • Fulfilling subscription services
  • Providing cloud computing infrastructure

 

8. Legal Notice

We may disclose your personal information as required by law, such as to comply with a subpoena or other legal process, when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request. If IT Convergence is involved in a merger, acquisition, or sale of all or a portion of its assets, you will be notified via email and/or a prominent notice on our website, of any change in ownership, uses of your personal information, and choices you may have regarding your personal information. We may also disclose your personal information to any other third party with your prior consent.

 

9. Security

The security of your personal information is important to us. We follow generally accepted standards to protect the personal information submitted to us, both during transmission and once it is received. If you have any questions about the security or sale of your personal information, you can contact us at privacy@itconvergence.com.

Privacy Breach Notification: In the event of a confirmed security incident resulting in the unauthorized access or disclosure of Personal Identifiable Information (PII), ITC will notify the affected Data Controller (Client) without undue delay, and in any event within forty-eight (48) hours of confirmation, unless otherwise agreed. This notification will include the nature of the breach, the data affected, and the remediation steps taken.

 

10. Changing or Deleting Personal Information

10.1 Upon request IT Convergence will provide you with information about whether we hold any of your personal information. Send us an e-mail to privacy@itconvergence.com and we will change or delete your information, according to your instructions. ITC will respond to all valid Data Subject requests within thirty (30) days, unless a shorter period is required by applicable law.

 

11. Data Retention

11.1 In certain circumstances we may be required by law to retain your personal information, or may need to retain your personal information in order to continue providing a service.

 

Policy Compliance

 

Internal Compliance

The ITC Audit and Compliance Team team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the user. An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with IT Convergence. Any program code or application (if applicable) that is found to violate this policy must be remediated within a 90 day period.

 

Changes to This Privacy Policy

We may update this Privacy Policy to reflect changes to our information practices. If we make any material changes we will notify you by email (sent to the e-mail address specified in your account) or by means of a notice on this website prior to the change becoming effective. We encourage you to periodically review this page for the latest information on our privacy practices.

 

Contact Us

IT Convergence, Inc. (Worldwide Headquarters)
511 East John Carpenter Freeway, Suite 500-580
Irving, TX 75062
Telephone: (800) 675-0032