Translation Terminal Pte Ltd is committed to preserving the privacy to all visitors to www.translationterminal.com and the users of the Web portal.
Scope of application
By using the contact or registration forms on this website, or by placing an order through the Translation Terminal web portal, you consent to the collection, use and transfer of your information under the terms of this policy.
Gathering and use of information
We collect personal information as soon as you complete and send us interactive forms, and we may collect information about you from your e-mails, letters or phone calls. In addition, we receive and save information automatically from the server logs.
Your information will enable us to provide you with access to all parts of our site and to supply services you have requested. In particular, we may use your information to contact you for your views on our services and to notify you occasionally about important changes or developments to the site or our services. It will also enable us to bill you and to contact you where necessary concerning your jobs or projects. We will also use and analyse the information we collect so that we can administer, support, improve and develop our business.
Distribution of information
The translators in our network and other partners may receive information about the client and the client’s company. They shall treat that information as strictly confidential and sign a confidentiality agreement to this effect.
You can rest assured that we will neither use your personal information for commercial purposes nor disclose it to anybody outside of our organisation.
We employ the following security measures to protect your information from access by unauthorised persons and against unlawful processing, accidental loss, destruction and damage.
- Secured data transfer with SSL: Secure Sockets Layer (SSL) is used to encrypt data exchanged between end users and the portal server.
- File encryption: With the Advanced Encryption Standard (AES), one of the best and fastest encryption algorithms currently in use has been adopted for file encryption.
- Input Sanitation: Throughout the application, user input is properly checked before being accepted.
- Access Checks: Additional access checks are performed to ensure that information shown to the user or commands accepted by the user are valid.