Beyond icebox countertop Manuale Utente

Pagina di 70
CounterTop Owner’s Manual
52
Privacy Policy
Icebox, LLC is committed to protecting the privacy and security of iCEBOX 
users. This privacy policy will advise you about how we protect your per-
sonal information and address your potential concerns over the use of this 
information. We may need to change this policy from time to time to 
address new issues and changes in our product. If you have any questions 
or concerns about your privacy, please send Email to 
customercare@iceboxllc.com.
Personal Identification Policy
Icebox, LLC will not disclose any personal identification information about 
you as an individual user, such as your address, name, or telephone num-
ber. We may request personal identification information for the use of our 
services. We have two exceptions to this policy:
1.
We will release specific information about your account to comply with 
any valid legal process, such as a search warrant, subpoena, statute, 
or court order.
2.
We will release specific information in special cases, such as if there is 
a physical threat to you or others.
Privacy of Children
We urge all parents to participate in their children's Internet and online 
experience. Please teach children about protecting their personal informa-
tion while online. 
Other Web Sites
If you should give out personal information online, through bulletin boards 
or other Web sites, that information can be used by third parties. You dis-
close information in these areas at your own risk. We encourage you to 
investigate and ask questions before disclosing information to third 
parties.
Security Information
Protecting your privacy and information is a priority of Icebox, LLC. We 
have taken careful measures to secure both our information and our physi-
cal premises. We exercise great care in providing secure transmissions of 
your personal information from your unit to our servers. Our server soft-
ware encrypts information, which is intended to ensure that all Icebox, LLC 
transactions remain private (unless sent by an unsecured means, such as 
Email). We also make use of firewalls and secure socket layers where 
appropriate.