We may collect personally identifiable information such as your name, address, email address, telephone number etc. This information may be gathered when you visit the site to request for information on our services, when you send an inquiry by email or other means, submit your resume as a part of a job application or request for information.
In connection with a job application or an inquiry, whether advertised on this site or otherwise, you may provide us with a resume or curriculum vitae. we may use this information throughout Jarus and its related entities for the purpose of employment consideration or your inquiry. Except where you tell us not to, we will keep the information for future consideration.
We may provide the information that we collect and the data generated by our cookies to our third party partners. Such third party partners may use the information to maintain various databases for us and provide you with information. We will also disclose your personally identifiable information if we reasonably believed we are required to do so by law, regulation or other government authority. In addition, we may transfer your personally identifiable information to a successor entity upon merger, consolidation or other corporate reorganization. It is our practice to seek appropriate protection for information in these types of transactions. If you would prefer that we not share this information with third parties, please contact us so we can take the appropriate action.
Links to third party sites
This site may be linked to other websites on the Internet which are not under the control of or maintained by us. Such links do not constitute an endorsement by us of those other web sites, the content displayed therein, or the persons or the entities associated therewith. We are not responsible for the privacy practices or the content of those other web sites.
We employ procedural and technological measures, consistent with the demands of customer service. Such measures are reasonably designed to protect your personally identifiable information from loss, unauthorized access, disclosure, alteration or destruction. We may use encryption, password protection, firewalls, internal restrictions and other security measures to help prevent unauthorized access.