Privacy Policy

Type of website: Business website
Effective date: 14th day of May, 2024

ferrettisearch.com (the “Site”) is owned and operated by Jenna Webb. Jenna Webb can be contacted at:

jwebb@ferrettisearch.com
(704) 773-5449
110 Matthews Station Suit 2D Matthews, NC 28105

Purpose
The purpose of this privacy policy (this “Privacy Policy”) is to inform users of our Site of the following:

      1. The personal data we will collect;

      1. Use of collected data;

      1. Who has access to the data collected;

      1. The rights of Site users; and

      1. The Site’s cookie policy.

    This Privacy Policy applies in addition to the terms and conditions of our Site.

    Consent
    By using our Site users agree that they consent to:

        1. The conditions set out in this Privacy Policy; and

        1. The collection, use, and retention of the data listed in this Privacy Policy.

      Personal Data We Collect
      We only collect data that helps us achieve the purpose set out in this Privacy Policy. We will not collect any additional data beyond the data listed below without notifying you first.

      Data Collected in a Non-Automatic Way
      We may also collect the following data when you perform certain functions on our Site:

          1. First and last name;

          1. Email address;

          1. Phone number; and

          1. Address.

        This data may be collected using the following methods:

            1. Creating an account.

          How We Use Personal Data
          Data collected on our Site will only be used for the purposes specified in this Privacy Policy or indicated on the relevant pages of our Site. We will not use your data beyond what we disclose in this Privacy Policy.

          The data we collect when the user performs certain functions may be used for the following purposes:

              1. Communication.

            Who We Share Personal Data With
            Employees
            We may disclose user data to any member of our organization who reasonably needs access to user data to achieve the purposes set out in this Privacy Policy.

            Other Disclosures
            We will not sell or share your data with other third parties, except in the following cases:

                1. If the law requires it;

                1. If it is required for any legal proceeding;

                1. To prove or protect our legal rights; and

                1. To buyers or potential buyers of this company in the event that we seek to sell the company.

              If you follow hyperlinks from our Site to another Site, please note that we are not responsible for and have no control over their privacy policies and practices.

              How Long We Store Personal Data
              User data will be stored until the purpose the data was collected for has been achieved.

              You will be notified if your data is kept for longer than this period.

              How We Protect Your Personal Data
              In order to protect your security, we use the strongest available browser encryption and store all of our data on servers in secure facilities. All data is only accessible to our employees. Our employees are bound by strict confidentiality agreements and a breach of this agreement would result in the employee’s termination.

              While we take all reasonable precautions to ensure that user data is secure and that users are protected, there always remains the risk of harm. The Internet as a whole can be insecure at times and therefore we are unable to guarantee the security of user data beyond what is reasonably practical.

              Children
              We do not knowingly collect or use personal data from children under 13 years of age. If we learn that we have collected personal data from a child under 13 years of age, the personal data will be deleted as soon as possible. If a child under 13 years of age has provided us with personal data their parent or guardian may contact our privacy officer.

              How to Access, Modify, Delete, or Challenge the Data Collected
              If you would like to know if we have collected your personal data, how we have used your personal data, if we have disclosed your personal data and to who we disclosed your personal data, or if you would like your data to be deleted or modified in any way, please contact our privacy officer here:

              Jenna Webb
              jwebb@ferrettisearch.com
              (704) 773-5449
              110 Matthews Station St  Suite 2D Matthews, NC 28105

              Do Not Track Notice
              Do Not Track (“DNT”) is a privacy preference that you can set in certain web browsers. We do not track the users of our Site over time and across third party websites and therefore do not respond to browser-initiated DNT signals.

              Cookie Policy
              A cookie is a small file, stored on a user’s hard drive by a website. Its purpose is to collect data relating to the user’s browsing habits. You can choose to be notified each time a cookie is transmitted. You can also choose to disable cookies entirely in your internet browser, but this may decrease the quality of your user experience.

              We do not use cookies on our Site.

              Modifications
              This Privacy Policy may be amended from time to time in order to maintain compliance with the law and to reflect any changes to our data collection process. When we amend this Privacy Policy we will update the “Effective Date” at the top of this Privacy Policy. We recommend that our users periodically review our Privacy Policy to ensure that they are notified of any updates. If necessary, we may notify users by email of changes to this Privacy Policy.

              Contact Information
              If you have any questions, concerns or complaints, you can contact our privacy officer, Jenna Webb, at:

              jwebb@ferrettisearch.com
              (704) 773-5449
              110 Matthews Station St  Suite 2D Matthews, NC 28105



              Companywide User Access Policy and Guidelines (Internal and External)

              Effective Date: May 14, 2024

              Purpose and Objectives

              This policy outlines the procedures for managing user access to company systems, applications, and data. Its primary objectives are to:

              • Security: Protect sensitive company and client information from unauthorized access and misuse.
              • Compliance: Ensure compliance with relevant data privacy regulations.
              • Efficiency: Streamline user access requests and minimize administrative tasks.
              • Accountability: Establish clear roles and responsibilities for user access management.


              Scope

              This policy applies to all employees, contractors, and third parties who require access to company systems and data, including:

              • Employees: Full-time, part-time, temporary, and interns.
              • Contractors: Independent contractors, consultants, and freelancers.
              • Third Parties: Vendors, suppliers, and other external stakeholders.


              Access Control Principles

              • Principle of Minimum Requirement: Users should only be granted the minimum level of access necessary to perform their job duties.
              • Separation of Duties: Critical functions should be segregated to prevent excessive control by a single individual.
              • Regular Reviews: User access rights should be reviewed and updated regularly.
              • Accountability: All users are responsible for the security of their accounts and the confidentiality of company information.


              User Access Levels

              • Administrator: Highest level of access, with the ability to manage user accounts, system configurations, and security settings.
              • Manager: Access limited to relevant department or team information.
              • Human Resources: Access to confidential personnel documentation.
              • Employee: Access to company-wide resources and required job functions.
              • Contractor/Third Party: Limited access to specific systems based on contractual obligations.


              Access Request and Provisioning

              New User Onboarding

                • Requests must be submitted and approved as per the onboarding process.
                • Approval required from the manager and/or Chief Executive Officer.
                • Upon approval, new user accounts will be created with appropriate access privileges.

              User Role Changes

                • When a user’s job role changes, their access privileges must be reviewed and adjusted.
                • Access requests must be submitted and approved.

              Third-Party Access

                • Access for third parties must be evaluated and limited to necessary information and systems.

              Access Revocation

              Employee Termination

                • All access rights must be immediately revoked.
                • Accounts on company platforms will be deactivated.
                • IT consulting partner will remove access and terminate active sessions.
                • Companywide software passwords will be updated per security guidelines.
                • Terminated employee data will be reviewed and managed securely.
                • Company devices must be returned, and confidential information deleted.

              Contractor/Third Party Agreements

                • Access will be revoked upon contract completion.
                • Data Use Agreements will be reviewed and updated.

              Password Management

              • Strong Passwords: Users must create and use strong, unique passwords.
              • Password Complexity: Minimum length of 10 characters, including uppercase, lowercase, numbers, and special characters.
              • Regular Password Changes: Passwords must be changed at least every 90 days.
              • Password Protection: Passwords must not be shared or stored insecurely.

               

              Data Security

              • Confidentiality: Users must maintain the confidentiality of company and client data.
              • Data Handling: Handle sensitive data carefully, avoid unsecured transmissions, and properly dispose of confidential documents.
              • Data Breaches: Suspected breaches must be reported to IT immediately.

              User Responsibilities

              • Comply with this policy.
              • Report any security incidents to IT.
              • Use strong passwords and avoid sharing login credentials.
              • Log out of accounts when finished using company systems.
              • Follow data security best practices.

              Training and Awareness

              Onboarding Orientation Training

                • All new employees must complete security training.

              Regular Training

                • Security awareness training will be provided regularly.
                • Routine updates on policy expectations and security risks will be shared internally.

              Modifications

              We may update this Companywide User Access Policy from time to time. Any material changes will be posted on our website.

              Enforcement

              Violations of this policy may result in disciplinary action, up to and including termination.

              Contact Information

              If you have any questions, concerns, or complaints, contact our access administrator:

              Jenna Webb
              Email: jwebb@ferrettisearch.com
              Phone: (704) 773-5449
              Address: 110 Matthews Station St Suite 2D, Matthews, NC 28105