Who we are
Our website address is: http://www.legacytechgroup.com/.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
This site does not accept media uploads. The purpose of this site is to provide information for the use of patrons and customers of Legacy Technical Group, Inc. and potential patrons and customers.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
Usage of this site and the data collected is considered proprietary to Legacy Technical Group, Inc. and is not shared under the current policy and applications of the site outside of Legacy Technical Group, Inc..
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Your contact information
All contact information is considered proprietary to Legacy Technical Group, Inc. for the use of contacting the contact by Legacy Technical Group, Inc..
Violation of site policies or use of the site to insight surreptitious activities towards Legacy Technical Group, Inc. or other patrons and users can be grounds for expulsion. In addition illegal activities will be reported to the Federal Authorities. Continued monitored attacks will result in the entire block of IP networks and will not be resolved until the bad actors are identified and guarantees of proper activity.
How we protect your data
The Legacy Technical Group, Inc. site and systems follow the PCI-DSS standards for commercial information. Appropriate monitoring of traffic and use of Universal Threat Management systems are employed and maintained to current standards. Operating systems and site softwares are maintained to the current security packs as provided by the apparatus and software vendors. We value out customers and their privacy. Personal Identifying Information (PII) is maintained under standards set forth by the Identity Theft Resource Center (ITRC) and Federal Laws.
What data breach procedures we have in place
In the event of improper access of PII an incident report is filed with the ISP provider where the breach was detected as well as the ISP that the Legacy Technical Group, Inc. systems are maintained. The actions of the NOC are based upon the policies of that ISP. The Legacy Technical Group, Inc. is a SSL site. There are guarantees from the SSL provider in regards to the security of the SSL purchased by Legacy Technical Group, Inc.. In the event of any illegal activities the Federal agencies will be given the same incident report and cooperation provided in regards to the incident only. PII will only be accessed in accordance with PII protection laws.
What third parties we receive data from
Analytics may by accumulated using the Google Analytics system and under all potential or current agreements for the purpose of directing Legacy Technical Group, Inc..
What automated decision making and/or profiling we do with user data
The current policy is to identify patrons and users of the Legacy Technical Group, Inc. site for the purpose of providing services and goods of Legacy Technical Group, Inc. Other then the automated systems of the Universal Threat Management system which may block address IP blacks there are no other automated profiling or decision making at this time.
Industry regulatory disclosure requirements
Legacy Technical Group, Inc. provides consulting and products to several industries including, Aerospace, Refining, Environmental Impact, and Shooting Sports. All of these industries have governing regulatory disclosures. US Federal Regulations (CFR) are adhered to as well as laws in the State of Utah and States in pacts or agreements with the State. It is the responsibility of the site user to know the industry and laws the pertain to their activities in regards to Legacy Technical Group, Inc..