fbpx

Privacy Policy of NexLev LLC.

NexLev LLC operates the nexlev.com website, which provides products and services found on this site.

This page is used to inform website visitors regarding our policies with the collection, use, and disclosure of Personal Information if anyone decided to use our products and services, the NexLev website.

If you choose to use our products or services, then you agree to the collection and use of information in relation with this policy. The Personal Information that we collect are used for providing and improving our company and this website. We will not use or share your information with anyone except as described in this Privacy Policy.

The terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, which is accessible at nexlev.com, unless otherwise defined in this Privacy Policy.

Information Collection and Use

For a better experience while using our Service, we may require you to provide us with certain personally identifiable information, including but not limited to your name, phone number, email, and postal address. The information that we collect will be used to contact or identify you. This information may also be used by sister or parent companies of NexLev such as Denali Concrete and Creative Signs & Graphics. Your info may be collected and used by those other two companies to market their services to you through emails, texts, targeted ads, etc. NexLev may also send email campaigns to its subscribers on behalf of a NexLev client. The client will not have access to view your email address or other pieces of personal info. Emails sent on behalf of a NexLev client will say “Powered by NexLev” in the footer of the email.

Log Data

We want to inform you that whenever you visit our Service, we collect information that your browser sends to us that is called Log Data. This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser version, pages of our Service that you visit, the time and date of your visit, the time spent on those pages, and other statistics.

Cookies

Cookies are files with small amount of data that is commonly used an anonymous unique identifier. These are sent to your browser from the website that you visit and are stored on your computer’s hard drive.

Our website uses these “cookies” to collection information and to improve our Service. You have the option to either accept or refuse these cookies, and know when a cookie is being sent to your computer. If you choose to refuse our cookies, you may not be able to use some portions of our Service.

Service Providers

We may employ third-party companies and individuals due to the following reasons:

  • To facilitate our operations, product sales, and services;

  • To provide our services on our behalf;

  • To perform marketing-related services; or

  • To assist us in analyzing how our products and services are used.

We want to inform our users that these third parties have access to your Personal Information. The reason is to perform the tasks assigned to them on our behalf. However, they are obligated not to disclose or use the information for any other purpose.

Security

We value your trust in providing us your Personal Information, thus we are striving to use commercially acceptable means of protecting it. But remember that no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and we cannot guarantee its absolute security.

Links to Other Sites

Our website may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by us. Therefore, we strongly advise you to review the Privacy Policy of these websites. We have no control over, and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

Children’s Privacy

Our services do not address anyone under the age of 13. We do not knowingly collect personal identifiable information from children under 13. In the case we discover that a child under 13 has provided us with personal information, we immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact us so that we will be able to take necessary actions.

Changes to This Privacy Policy

We may update our Privacy Policy from time to time. Thus, we advise you to review this page periodically for any changes. We will notify you of any changes by posting the new Privacy Policy on this page. These changes are effective immediately, after they are posted on this page.

Contact Us

If you have any questions or suggestions about our Privacy Policy, do not hesitate to contact us.

You can email us at marketing@nexlev.com

or post to

2333 N 200 E
Spanish Fork, Ut 84660

IT Security Policy of NexLev LLC

Introduction
a. Purpose: The purpose of this policy is to outline guidelines and best practices for ensuring the confidentiality, integrity, and availability of information and information systems within NexLev LLC.

b. Scope: This policy applies to all employees, contractors, and third-party vendors who have access to NexLev LLC’s information systems and data.

Information Security Roles and Responsibilities
a. Management Responsibilities: Management is responsible for implementing and enforcing this policy, assigning information security roles, and providing necessary resources for effective information security.

b. Employee Responsibilities: All employees are responsible for protecting the confidentiality, integrity, and availability of information assets. They must adhere to the security policies and report any security incidents promptly.

Information Classification and Handling
a. Data Classification: NexLev LLC adopts a classification scheme for information assets based on their sensitivity. The classification levels are:

Confidential: Information that, if disclosed, could cause significant harm to NexLev LLC.
Internal Use Only: Information intended for internal use within NexLev LLC.

Public: Information that can be freely shared with the public.
b. Data Access and Usage: Guidelines for data access and usage include:

Access Privileges: Users will be granted access to information systems based on their job responsibilities. Access will be reviewed periodically.

Acceptable Use: Users must use information resources responsibly and for authorized purposes only. Personal use should be minimal and not interfere with work responsibilities.

Data Storage: Data should be stored securely, taking into account the classification level and any legal or regulatory requirements.

Data Sharing: Data should only be shared with authorized individuals or entities following appropriate protocols and approvals.

Data Disposal: When data is no longer needed, it should be disposed of securely to prevent unauthorized access.

User Access Management
a. User Provisioning: User access to information systems will be granted based on job roles and responsibilities. Requests for access will be submitted to the IT department and reviewed and approved by the appropriate authority.

b. Password Policy: Password requirements include:

Complexity: Passwords must meet minimum complexity requirements (e.g., minimum length, use of uppercase and lowercase letters, numbers, and special characters).
Expiration: Passwords must be changed periodically, and users will receive reminders to update their passwords.
Prohibited Actions: Passwords should not be shared with others, stored in an unsecured manner, or reused across different systems.
c. Multi-Factor Authentication: NexLev LLC encourages the use of multi-factor authentication for accessing sensitive systems and data, where feasible.

Incident Management
a. Reporting Security Incidents: All employees and contractors must promptly report any actual or suspected security incidents to the IT department or the designated authority. Incident response procedures will be followed to mitigate and address security breaches.

b. Security Incident Response: NexLev LLC will maintain an incident response plan outlining the steps to be followed in the event of a security incident. The plan will include procedures for containment, investigation, recovery, and communication.

Security Awareness and Training
a. Security Awareness Program: NexLev LLC will establish a security awareness program to educate employees about security threats, best practices, and their responsibilities in maintaining a secure environment.

b. Training: All employees will receive initial and ongoing security training to ensure they understand security policies, procedures, and their role in protecting information assets.

Compliance
a. Compliance Monitoring: NexLev LLC will periodically conduct security audits and assessments to evaluate compliance with this policy. Non-compliance may result in disciplinary action.

b. Policy Review: This policy will be reviewed periodically and updated as necessary to reflect changes in technology, regulations, or business requirements.

By implementing and adhering to this IT security policy, NexLev LLC aims to safeguard its information assets, protect against unauthorized access, and maintain the trust of its customers and stakeholders.