Our Privacy Policy
Ickler Electric Corporation (“Ickler”) operates icklerelectric.com, It is our policy to respect your privacy regarding any information we may collect while operating our websites.
Your privacy is critically important to us. At Ickler Electric we have a few fundamental principles:
- We don’t ask you for personal information unless we truly need it.
- We don’t share your personal information with anyone except to comply with the law, develop our products, or protect our rights.
- We don’t store personal information on our servers unless required for the on-going operation of one of our services.
- In our blogging products, we aim to make it as simple as possible for you to control what’s visible to the public, seen by search engines, kept private, and permanently deleted.
Below is our privacy policy which incorporates these goals:
If you have questions about deleting or correcting your personal data please contact our support team.
Ickler Electric Corporation (“Ickler”) operates icklerelectric.com, It is our policy to respect your privacy regarding any information we may collect while operating our websites.
Website Visitors
Like most website operators, Ickler collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. Our purpose in collecting non-personally identifying information is to better understand how our visitors use the website.
Ickler also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users and for users leaving comments on blogs. Ickler only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that blog commenter IP addresses and email addresses are visible and disclosed to the administrators of the blog where the comment was left.
Gathering of Personally-Identifying Information
Certain visitors to the website choose to interact with Ickler in ways that require us to gather personally-identifying information. The amount and type of information that we gather depends on the nature of the interaction.
In each case, Ickler collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor’s interaction with us. We do not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.
Aggregated Statistics
Ickler may collect statistics about the behavior of visitors to its websites. We may display this information publicly or provide it to others. However, we do not disclose personally-identifying information other than as described below.
Protection of Certain Personally-Identifying Information
Ickler discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on our behalf or to provide services available at Ickler, and (ii) that have agreed not to disclose it to others. Ickler will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, Ickler discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when we believe in good faith that disclosure is reasonably necessary to protect the property or rights of Ickler, third parties or the public at large. If you are a registered user and have supplied your email address, we may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with Ickler and our projects. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. Ickler takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.
Cookies
A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Ickler uses cookies to help us identify and track visitors, their usage of our website, and their website access preferences. Visitors who do not wish to have cookies placed on their computers should set their browsers to refuse cookies before using our website, with the drawback that certain features of the website may not function properly without the aid of cookies.
Business Transfers
If Ickler, or substantially all of its assets, were acquired, or in the unlikely event that we go out of business or enter bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of Ickler may continue to use your personal information as set forth in this policy.
Advertisements and Campaigns
Ads appearing on any of our websites may be delivered to users by advertising partners, who may set cookies. These cookies allow the ad server to recognize your computer each time they send you an online advertisement to compile information about you or others who use your computer. This information allows ad networks to, among other things, deliver targeted advertisements that they believe will be of most interest to you. This Privacy Policy covers the use of cookies by Ickler and does not cover the use of cookies by any advertisers.
Privacy Policy Changes
Although most changes are likely to be minor, Ickler may change its Privacy Policy from time to time, and in our sole discretion. We encourage visitors to frequently check this page for any changes to its Privacy Policy. Your continued use of this site after any change in this Privacy Policy will constitute your acceptance of such change.
Messaging Policy
This Messaging Policy applies to SMS, MMS, Chat, messaging channels. We all expect that the messages we want to receive will reach us, unhindered by filtering or other blockers. An important step IEC and our customers can take to make that expectation reality is to prevent and eliminate unwanted messages. Towards that end, we strive to work with our customers so that messages are sent with the consent of the message recipient, and that those messages comply with applicable laws, communications industry guidelines or standards, and measures of fairness and decency.
IEC treats all messaging transmitted via IEC’s platform - regardless of use case or phone number type (e.g., long code, short code, or toll-free) - as Application-to-Person (A2P) messaging. All A2P messages originating from IEC are subject to this Messaging Policy, which covers rules and /or prohibitions regarding:
•Consent ( “opt-in”);
•Revocation of Consent (“opt-out”);
•Sender Identification;
•Messaging Usage;
•Filtering Evasion; and
•Enforcement.
This policy applies to all customers who use IEC’s messaging channels. If you provide your own end users or clients with the ability to send messages through IEC, for example as an ISV (Independent Software Vendor), you are responsible for the messaging activity of these users. You must ensure that any messaging activity generated by your users is in compliance with IEC policies.
Consent / Opt-in
What Is Proper Consent?
Consent can't be bought, sold, or exchanged. For example, you can't obtain the consent of message recipients by purchasing a phone list from another party.
Aside from two exceptions noted later in this section, you need to meet each of the consent requirements listed below. If you are a software or platform provider using IEC’s platform for messaging within your application or service, you must require your customers to adhere to these same requirements when dealing with their users and customers.
Consent Requirements
•Prior to sending the first message, you must obtain agreement from the message recipient to communicate with them - this is referred to as "consent", you must make clear to the individual they are agreeing to receive messages of the type you're going to send. You need to keep a record of the consent, such as a copy of the document or form that the message recipient signed, or a timestamp of when the customer completed a sign-up flow.
•If you do not send an initial message to that individual within a reasonable period after receiving consent (or as set forth by local regulations or best practices), then you will need to reconfirm consent in the first message you send to that recipient.
•The consent applies only to you, and to the specific use or campaign that the recipient has consented to. You can't treat it as blanket consent allowing you to send messages from other brands or companies you may have, or additional messages about other uses or campaigns.
•Proof of opt-in consent should be retained as set forth by local regulation or best practices after the end user opts out of receiving messages.
Alternative Consent Requirements
Alternative Consent Requirements
While consent is always required and the consent requirements noted above are generally the safest path, there are two scenarios where consent can be received differently.
Contact initiated by an individual
If an individual sends a message to you, you are free to respond in an exchange with that individual. For example, if an individual texts your phone number asking for your hours of operation, you can respond directly to that individual, relaying your open hours. In such a case, the individual’s inbound message to you constitutes both consent and proof of consent. Remember that the consent is limited only to that particular conversation. Unless you obtain additional consent, don't send messages that are outside that conversation. Informational content to an individual based on a prior relationship
You may send a message to an individual where you have a prior relationship, provided that individual provided their phone number to you, and has taken some action to trigger the potential communication, and has not expressed a preference to not receive messages from you. Actions can include a button press, alert setup, appointments, or order placements. Examples of acceptable messages in these scenarios include appointment reminders, receipts, one-time passwords, order/shipping/reservation confirmations, drivers coordinating pick up locations with riders, and repair persons confirming service call times. The message can't attempt to promote a product, convince someone to buy something, or advocate for a social cause.
Periodic Messages and Ongoing Consent
If you intend to send messages to a recipient on an ongoing basis, you should confirm the recipient’s consent by offering them a clear reminder of how to unsubscribe from those messages using standard opt-out language (defined below). You must also respect the message recipient’s preferences in terms of frequency of contact. You also need to proactively ask individuals to reconfirm their consent as set forth by local regulations and best practices. Identifying Yourself as the Sender Every message you send must clearly identify you (the party that obtained the opt-in from the recipient) as the sender, except in follow-up messages of an ongoing conversation.
Opt-out
The initial message that you send to an individual needs to include the following language: “Reply STOP to unsubscribe,” or the equivalent using another standard opt-out keyword, such as STOPALL, UNSUBSCRIBE, CANCEL, END, and QUIT. Individuals must have the ability to revoke consent at any time by replying with a standard opt-out keyword. When an individual opts out, you may deliver one final message to confirm that the opt-out has been processed, but any subsequent messages are not allowed. An individual must once again provide consent before you can send any additional messages.
Content We Do Not Allow
The key to ensuring that messaging remains a great channel for communication and innovation is preventing abusive use of messaging platforms. That means we never allow some types of content on our platform, even if our customers get consent from recipients for that content. IEC’s Privacy Policy prohibits sending any content that is illegal, harmful, unwanted, inappropriate, objectionable, confirmed to be criminal misinformation, or otherwise poses a threat to the public, even if the content is permissible by law. Other prohibited uses include:
•Anything that is illegal in the jurisdiction where the message recipient lives.
•Hate speech, harassment, exploitative, abusive, or any communications that originate from a hate group.
•Fraudulent messages.
•Malicious content, such as malware or viruses.
•Any content that is designed to intentionally evade filters (see below).
Messaging Policy Violation Detection and Prevention Evasion
Customers may not use IEC’s platform to evade IEC’s or a telecommunications provider’s unwanted messaging detection and prevention mechanisms. Subject to IEC’s Privacy Notice, IEC collects and monitors the content of text messages that are transmitted via IEC’s platform to certain countries in order to detect spam, fraudulent activity, and violations of IEC's Acceptable Use Policy. For more information on the collection and monitoring of text message content in certain countries, please review IEC’s Country Specific Requirements, which are part of IEC’s Acceptable Use Policy. Examples of prohibited practices include:
•Content designed to evade detection. As noted above, we do not allow content which has been specifically designed to evade detection by unwanted messaging detection and prevention mechanisms. This includes intentionally misspelled words or non-standard opt-out phrases which have been specifically created with the intent to evade these mechanisms.
•Snowshoeing. We do not permit snowshoeing, which is defined as spreading similar or identical messages across many phone numbers with the intent or effect of evading unwanted messaging detection and prevention mechanisms.
•Other practices identified and prohibited by this policy and IEC’s Acceptable Use Policy.
How We Handle Violations
When we identify a violation of these principles, where possible, we will work with customers in good faith to get them back into compliance with this policy. However, to protect the continued ability of all our customers to freely use messaging for legitimate purposes, we reserve the right to suspend or remove access to IEC’s platform for customers or customers’ end users’ that we determine are not complying with the Messaging Policy, or who are not following the law in any applicable area or applicable communications industry guidelines or standards, in some instances with limited notice in the case of serious violations of this policy.