Some of the services on this website allow you to send us an email. We will use the information you provide, such as email address or phone number, only to respond to your inquiry. Keep in mind that email transmissions are not encrypted by default, so we suggest you do not send sensitive information such as Social Security numbers, credit card numbers, or bank account information via such contact forms.
If such information is required, it will be via a web page that clearly states the page and its transmission of information is secure and encrypted. All electronic messages received from visitors are deleted when no longer needed.
Murph co. uses commenting and social media plug-ins and third-party websites. We use those third-party services to interact with visitors and to build our community on social media. We also uses these third-party services to measure the number of visitors to our website, to interact with visitors on the site, and to make our website more useful to visitors.
In such cases, the third-party application may request an email address, username, password, internet protocol (IP) address, and geographic location for account registration or sign-in purposes. Murph co. does not use those third-party websites or services to collect personal information from individuals. Any personal information collected by the third-party website will not be stored or transmitted by Murph co.. Murph co. has no control over or access to specific login information or any other sensitive personal information provide to third-party websites.
Murph co. takes the security of your personal information very seriously. We take many precautions to ensure that the information we collect is secure and inaccessible by anyone outside of our organization. These precautions include advanced access controls to limit access to that information to only internal personnel who require access to that information. We also use numerous security technologies to protect all data stored on our servers and related systems. Our security measures are regularly upgraded and tested to ensure they are effective.
We take the following specific steps to protect your information:
(1) Use internal access controls so only limited personnel have access to your information.
(2) Anyone with access to user information is trained on all relevant security and compliance policies.
(3) Servers that store visitor information are regularly backed up to protect against loss.
(4) All information is secured through modern security technologies like secure socket layer (SSL), encryption, firewalls, and secure passwords.
All access safeguards described above are in place to prevent unauthorized access by outsiders to information stored on or transmitted by our systems.”