DenShir Protocol and
Leadership Consulting (DPLC)
How inaccurate information you can correct
What choices you have regarding the use of your data that is available
The security protection of procedures that are in place to protect the misuse of your information
What personal identifiers of information is collected from you throughout the website, how it is used, and whom it may be share
Data Collection, Sharing, and Use
DenShir Protocol & Leadership Consulting, LLC are the sole owners of all data collected on this website. The collected information from this website, we only have access to what you voluntarily give us in emails or other forms of communication from you. The information you provide will not be sold or rented to anyone.
Access and Control Over Your Information
At any time you have the opportunity to opt-out of future communication from us. See below the following items you can do by contacting us through our email address or phone number provided on the website:
Update any information we have on file about you or your organization
Review any data we have on file if any
We will delete any information we have about you
Tell us at any time about your concerns about the use of your data
With all information, you give us we will take the necessary precautions to protect it. Regardless, of the form of communication, you use to submit your information for services it is protected. It will be encrypted and securely transmitted to us, whether online or offline.
To identify that the information you provide is securely transmitted is by noticing the lock that appears closed at the top or bottom of the website, also when you see ‘HTTPS//’ in front of the web page address.
The information you share offline is also securely protected. If we need to pull information and provide services such as mailing products at your request, customer service duties, or billing they will be permitted to access your personal information on file. Any of your data that is stored on computers or printed will be secured in either a locked file cabinet in the business office (where only the authorized employee will have access) or within a password-protected file. If you request to discontinue services, we will delete your information depending on where it is kept securely with a shredder or a computer software database.