THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
- What information we collect about you
- What choices you have about your information
- How we use your information
- How and with whom we may share the information we have about you
- How we protect your information
- How to contact us with questions or concerns
Information Collected About You
We may collect “Personal Information” about you – such as your name, address, telephone number, email address or health information – in the following ways:
- When you register for or update an existing profile on our Site;
- When you use certain interactive tools;
- When you sign up for newsletters or other communications from Alpha Therapeutics; or
- When you participate in an online survey
What Choices Do I have?
How Information Collected About You is Used
We may use information we collect about you to:
- Administer your account;
- Provide you with access to particular tools and services;
- Respond to your inquiries and send you administrative communications;
- Obtain your feedback on our Site;
- Statistically analyze user behavior and activity;
- Provide you with more relevant content;
- Conduct research and measurement activities;
- Send you personalized emails or secure electronic messages pertaining to your recommendations.
With Whom Do We Share Your Information?
Alpha Therapeutics will not disclose any Personal Information about you unless specifically agreed to by you, or
- To comply with legal requirements, such as a law, regulation, search warrant, subpoena, or court order;
- In the event of a corporate change in control resulting from, for example, a merger, a sale of assets, or bankruptcy; or
- In special cases, such as in response to a physical threat to you or others.
How Do We Secure and Retain Your Information?
We have put in place technical, physical, and administrative safeguards to protect the Personal Information we collect, including (1) encrypting data in the cloud both in transmission and in storage; (2) setting internal security controls to limit access to data; and (3) providing auditing capabilities, data back-up procedures and disaster recovery mechanisms.