Thank you for visiting “FIVE OCEANS SALVAGE” web site. We provide this service to you, subject to the following conditions. By browsing “FIVE OCEANS SALVAGE” web site, you accept these conditions.
Types of information When you visit our web site you may provide us with two types of information: personal information you knowingly choose to disclose that is collected on an individual basis and web site use information collected on an aggregate basis as you and others browse our Web site.
Personal information you choose to provide Any information you choose to provide us through the online form or by email, fax, or phone is strictly confidential and no other personal information is collected. However, if you choose to correspond further with us through email, we may retain the content of your email messages together with your email address and our responses. “FIVE OCEANS SALVAGE” does not share, sell or disclose any information to any other company, or third party, or sister company, and only a few trustworthy employees are involved in enquiries and communication with you.
If you elect to provide us with personal information – by e-mail or by completing a form and submitting it via our site – we use only that part of the information required to answer your message and provide follow-up. Electronic messages are covered by the same confidentiality measures as conventional mail. It will only be used for the purpose for which you have provided it and will not be added to a mailing list. We will not use your e-mail address for any other purpose than legitimate communication between Intermat and you.
Web site use information “FIVE OCEANS SALVAGE” is committed to protecting your privacy and does not obtain any personal information from you. Information transmitted automatically between computers cannot be used to identify you personally. It is collected only because of the technological demands of Internet navigation and is used exclusively for statistical purposes and to enhance the site’s functionality or make it more user-friendly.
Information security We utilize encryption/security software to safeguard the confidentiality of personal information we collect from unauthorized access or disclosure and accidental loss, alteration or destruction.
Employee access, training and expectations
In general, our business practices limit employee access to confidential information, and limit the use and disclosure of such information to authorized persons, processes and transactions.