This statement is designed to inform you of Lisa Christen // Christen Coaching & Consulting’s policy regarding the collection, use and disclosure of information we receive from website visitors, clients, mailing list subscribers, social media followers, and others with whom we are in contact. By visiting this website, you agree to the potential collection and use of information in accordance with this policy. Lisa Christen and/or Christen Coaching & Consulting may disclose information received from you where we reasonably believe that disclosure of such information is necessary to comply with law (including court and government orders, and civil subpoenas) or to our agents and advisors so that they may provide services to Lisa Christen, and only under strict confidentiality restrictions.
Information Collection, Use, and Sharing
Personal information is voluntarily given to us by the user. We may ask you to provide us with certain personally identifiable information that can be used to provide relevant updates regarding our services. Personally identifiable information may include, but is not limited to, (contact person’s) name, email address, telephone number, or any other information deemed necessary to maintain communication.
ICF exercises no control over these third-party sites and their privacy practices.
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline. Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for “https” at the beginning of the address of the web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.