Crimson Agility is committed to protecting your privacy and implementing technology that gives you a rewarding and safe online experience. We want you to feel secure when visiting our site and are committed to maintaining your privacy when doing so.
What information do we gather and how do we use it?
Information on CrimsonAgility.com and other Crimson Agility websites is gathered in two ways: directly and indirectly. Crimson Agility will at times ask you to directly provide information that personally identifies you (registering for an event, downloading a file, signing up for an email list, etc.). It is our policy to keep personal information only as long as needed to fulfill the purposes for which the information was collected.
We also collect information indirectly through our Internet access logs. When you visit CrimsonAgility.com, your Internet Protocol (IP) address is automatically collected and is placed in our Internet access logs. IP addresses are not linked to personally identifiable information. Your IP address is used to help diagnose any technical problems, analyze site trends, administer the site, track movement within the site, and gather broad demographic information about site use that can eventually be used to make improvements that enhance your user experience on Alpineinc.com.
Crimson Agility does not sell, exchange, trade or give away personal information you voluntarily provide to us to any outside sources.
Access to your information
You are entitled to know whether we hold information about you and, if we do, to have access to that information and require it to be corrected if it is inaccurate. You can do this by sending us an e-mail.
Crimson Agility may send email communication regarding events, its services, news, etc. We will always provide email recipients a clear and easy means to opt-out of receiving any future communication.
We take appropriate steps to provide and maintain a secure website. By visiting CrimsonAgility.com, however, you agree that the open nature of the Internet is such that data may flow over networks without security measures in place and may be accessed and used by people other than those for whom the data is intended.
Your acceptance of these terms