Business
Focused
Technology

Privacy Policy

Your privacy is important to us. To better protect your privacy, we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used.

The Information We Collect

This notice applies to all information collected or submitted on the website. On some pages, you can make requests, and register to receive materials. The types of personal information collected at these pages are:

The Way We Use Information

We use the information you provide about yourself when placing an order only to complete that request for information. We do not share this information with outside parties except to the extent necessary to complete that process. We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties. You can register with our website if you would like to receive our newsletter as well as updates on our new products and services. Information you submit on our website will not be used for this purpose unless you fill out the applicable registration form. Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above without also providing you an opportunity to opt-out or otherwise prohibit such unrelated uses.

Our Commitment to Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Secure Credit Card Transactions

For your safety and protection, your credit card information is not stored on our servers. Our payment gateway provider, Authorize.net, keeps this information encrypted and secure on your behalf. You can submit your payment at www.IT360.biz online with confidence. We have partnered with Authorize.Net, a leading payment gateway since 1996, to offer safe and secure credit card and electronic check transactions for our customers. The Authorize.Net Payment Gateway manages the complex routing of sensitive customer information through the credit card and electronic check processing networks (see an online payments diagram). The company adheres to strict industry standards for payment processing, including:

For additional information regarding the privacy of your sensitive cardholder data, please read the Authorize.Net Privacy Policy.

How You Can Access or Correct Your Information

You can inquire about all your personally identifiable information that we collect online and maintain by contacting us. We use this procedure to better safeguard your information. You can correct factual errors in your personally identifiable information by sending us a request that credibly shows error. To protect your privacy and security, we will also take reasonable steps to verify your identity before granting access or making corrections.

Principal Owner, Marketing Firm

Bringing IT360 on as our technology services “department” was one of the smartest business decisions we’ve made. Over the years, we’ve tried various similar services and have also hired internal IT staff, and we’ve never felt confident that we were adequately supported. IT360 has changed all that. They not only provide proactive, comprehensive technical support and consulting, they engage with us in a way that feels like they are part of our company…a true business partner.

Principal Owner, Marketing Firm

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more