Who we are
This privacy statement describes how Valorem Equity Partners, LLC (“Valorem Equity Partners”, “Valorem Equity”, “we”, “us,” or “our”) collects and uses the personal information of users and visitors of our website (“user”, “you”, or “your”): www.valoremequity.com. It also describes the choices available to you regarding our use of your personal information and how you can access and update this information.
Valorem Equity is committed to protecting your non-public personal information at all times. To that end, we employ and maintain physical, electronic, and procedural safeguards to ensure your non-public personal information is protected.
What personal data we collect and why we collect it
The following information may be collected when you use this web site: your server address, the date and time of your visit to the web site, the pages you accessed and the documents downloaded, the previous web site you visited, and the type of browser you are using. This information is collected for statistical purposes and to enable us to improve our web site. Where permitted by applicable law, third parties may be used from time to time to collect the above listed information and information on your online activities. Additionally, this web site may ask for specific personal information in order to respond to requests for information.
Valorem Equity uses a variety of third-party services to help provide the most user-friendly website possible. We also use third parties such as Google Analytics to help us understand how our visitors use our website. These third-parties may collect certain information from your browser (i.e. using cookies and/or your IP address), and may tailor your ads so that you see Valorem Equity advertisements on other websites. If you prefer, you can adjust your privacy settings in your browser so that your information is not tracked.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Analytics & 3rd Party Service Providers
Our Website may use third-party services such as Google Analytics, Facebook Pixels, and similar web analytics services.
We use Google Analytics, a web analysis service provided by Google, in order to better understand your use of our Websites and how we can improve them. Google Analytics collects information such as how often users visit a Website, what pages you visit when you do so, and what other websites you used prior to coming to such Website. Google Analytics collects only the IP address assigned to you on the date you visit a website, rather than your name or other identifying information.
Some of the areas of the System contain electronic images known as web beacons (sometimes known as clear gifs) that allow us, and our third party providers or affiliates, to count and track users who have visited certain portions of the System. Web beacons collect only limited information and do not collect any of your personal information.
What rights you have over your data
If you have filled out a form on our website, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Data submitted through online forms may go into our secure CRM so our employees can follow-up with you on information requested.
How we protect your data
The security of our users’ information is an important concern to us. We exercise care in providing secure transmission of your information from your computer to our infrastructure. We will use commercially reasonable methods to keep nonpublic personal information securely in our files and systems. We take commercially reasonable measures to secure and protect information transmitted via or stored on the System. Nevertheless, no security system is impenetrable. We cannot guarantee that information that users of the System may happen to transmit or otherwise supply will be totally secure.
For more information