access database repair center
microsoft access repair
HomeRecovery ReportTypical SymptomsFAQTestimonialsContact

Privacy Policy provides a secure method of getting your Microsoft Access database fixed. We treat user privacy seriously.

Data Collection undertakes to collect Your Data by means that are: Fair; Legal and Transparent.

If you visit the web-site, your web-browser automatically discloses, and web-server automatically logs, the following information: the date and time, the IP address from which you issued the request, the type of browser and operating system you are using, the URL of any page that referred you to the page, the URL you requested, and whether your request was successful. This data may or may not be sufficient to identify you.

Any additional data that you provide, e.g. in a web-form, may also be logged. This data may or may not be sufficient to identify you.

Any additional data that your web-browser automatically provides may also be logged. This will be the case, for example, if your browser has previously been requested to store data on your computer in 'cookies' and submits them each time you request a web-page within a particular domain (such as This data may or may not be sufficient to identify you.

If you disclose personal or company data to in conjunction with an identifier such as your name or your credit-card details, will collect personal data. Moreover, any data that becomes available to through any of the means described in the preceding paragraphs may be able to be associated with that identifier, and hence become logged.

Data Use
Use refers to the application of Your Data by any part of, or any staff-member or contractor of in the course of their work. only undertakes to use data only for:

1. The purposes for which it was collected; such other purposes as are subsequently agreed between and the user.
2. Such additional purposes as may be required by law. In these circumstances, will take any reasonable steps available to it to communicate to the user that the use has occurred, unless it is precluded from doing so by law.
3. Such additional purposes as are authorised by law (in particular to protect interests, e.g. if it believes on reasonable grounds that the user has failed to fulfil undertakings to or have committed a breach of the criminal law).
4. undertakes to use data only if it has demonstrable relevance to the particular use to which it is being put. undertakes to use data in such a manner as to take into account the possibility that it is not of sufficient quality for the purpose, e.g. because it is inaccurate, out-of-date, incomplete, or out-of-context.

Home | Links | Blog | Sitemap | Privacy Policy