Use of Information
We use Non-Personally Identifiable Information to manage this Website. We may analyze aggregated anonymous information on the pages visited by our users to make our Website more accessible and useful. Further, we may share this data with third parties, usually to provide services for National Construction & Architecture associated with the maintenance of the Website.
In addition, we may share this information with third parties to fulfill your request or to provide other services that may be of interest to you. If you do not wish National Construction & Architecture } to use your information in this manner, then do not submit any Personally Identifiable Information to us. In addition, National Construction & Architecture may disclose Personally Identifiable Information about you if we believe in good faith that the law requires it (such as a subpoena, court order or a law enforcement request), or if we reasonably believe it is necessary to protect our legal interests. The information collected from you may be transferred to a third party in the event of a sale, acquisition, merger or bankruptcy involving us.
Links to Other Websites
For your convenience, our Website may contain links to other websites whose information and privacy practices are probably different than ours. If you choose to use these links, you will leave our Website, and will then be subject to the privacy and information practices of those websites. We do not control and are not responsible for any of their content or their privacy policies, if any. We do not endorse or make any representations about them, or any information, software or other products or materials found there, or any results that may be obtained from using them. If you choose to access any of the other websites listed on our Website, you should understand that you do so at your own risk.
We employ commercially reasonable security measures to reduce the risk of unauthorized access to your Personally Identifiable Information. However, we cannot and do not guarantee that these measures will be sufficient to protect against all efforts to gain unauthorized access to that information.