Privacy Policy

Studer Education takes privacy and data protection issues seriously. We have designed this Privacy Policy to explain how we handle personally identifiable information collected from customers.

Scope of this Privacy Policy

This Privacy Policy covers Studer Education treatment of personally identifiable information collected from customers (hereafter “customers” or “you”) who use the Kentico Windows 8 Manager, as well as consumer information that we acquire during the course of our business. This Policy does not apply to the practices of companies that Studer Education does not own or control, or to people Studer Education does not employ or manage. This Policy is specific to the Studer Education and does apply to other web sites, applications or services.

Information Sharing and Disclosure

Protecting personally identifiable information about merchants and consumers is an import part of our business. Studer Education send personally identifiable information about you to other companies or people: 1)when we have you consent to share the information; 2) when we need to share you information with third parties, such as banks and credit card processors, to provide the product or service you have requested; 3) in connection with products and services offered by Studer Education business partners and/or companies who work on the behalf of Studer Education to provide a product or service to you; 4) it is appropriate to comply with the law; 5) it is necessary to protect the rights, property, or safety of Studer Education, our users, or others, which may include the exchange of information with other organizations for fraud protection and/or risk reduction. In the event that Studer Education is acquired, merchant account information may one of the transferred assets.

Information Security

Information security is critical to our business. We work to protect the security of your information during transmission by using Secure Sockets Layer *(SSL) software, which encrypts information. The information gathered on a secure computer is stored in a locked down data center. The number of employees involved in the management of the data center that have physical access to these computers is limited. We use firewalls and other security technologies, as well as implement the highest industry standard security practices, to prevent or computers from being accessed by unauthorized persons.

We also require that personally identifiable consumer information sent to us by you be encrypted using SSL encryption.

Get iLessonReady free on any system!

You can now create lesson plans on your computer, tablet, or even your mobile phone!

Download via