Skip to main content
All Posts By

Jodi Goddard

Open Doors Highlight

Why Open Doors?

I chose Open Doors because of my own struggles with being a single-teen parent. I had the support system of my family to help ensure that I did not become another statistic. Reading about Open Door and Circles program it really resonated with me on how important the services they are offering are helping other members of the community overcome the hurdles they face.

Philanthropy Friday

Open Doors was our very first Philanthropy Friday. I was so excited to be able to accomplish what I set out to do when I started Platinum Cares. As a company, we collected some of their most needed items for the food bank. Pantries are always short on dry goods, next time you donate to a food drive, try to keep that in mind.

We all know there are kids going hungry each night but it really hits home when you see a kid get so excited over a simple box of macaroni and cheese or when getting a boxed cake mix is a big deal. Something that we often take for granted, was a highlight of someone else’s day. As a society, we need to do better. Circles is one way that I hope to be able to help make a difference, among our other partners and volunteers.

Circles

My favorite part of Open Doors is Circles. Circles is a 12-week class to help low-income individuals break intergenerational poverty. It is peer-based mentoring where graduates are paired with other peer mentors for job training in business and trades.

I was invited to attend one of the Circles’ weekly meetings. I was literally moved to tears at the end. I have never seen that type of community or support among others in a long time. Each person there had a huge impact on me in various ways. Everyone is on a different step in their journey, but to watch them hold each other up, support them to help them reach their next step, offer other ideas, viewpoints and tips was an amazing experience.

I love how members of the community have a place to go to get not just resources, but the help to work through various barriers and come out on the other side with a whole new outlook on life in addition to their new skills and friendships that were built.

Open Doors services provided to people go well beyond aid to meet basic needs. It is education, support, a safe place for those who are struggling, a sense of community, being linked to others who have had the same experiences goes further than a caseworker, or a paper handout. It builds long-lasting results, not just for those attending the classes, but also for those who help support Open Doors in any way.

Secure It Or Lose It.

Mobile payments, whether on the receiving or paying end, is taking up a major chunk of how payments are made. With that, there has also been a huge increase in mobile payment fraud.

Prakash Ranganathan, Director of Cybersecurity at University of North Dakota noted hackers are finding a “lucrative target” in cheap card readers that attach to smartphones or tablets because it’s fairly easy to exploit their vulnerabilities. Therefore, it’s best to invest in higher-quality, more costly card readers.

Mobile phones are just like a laptop or PC, they are running on various hard and software systems.

I’m sure we all know someone who is still using an older device, which would be considered obsolete.

From a personal use standpoint, no big deal. From a business standpoint? DANGEROUS.

Why is it so “dangerous”?

The older devices are not able to support the latest security technology, leaving you wide open for hackers and fraud. According to a survey, the total percentage of mobile payment crimes has reached 71% in 2019. This percentage will only continue to climb higher and higher. As a responsible business owners, we need to revamp how we handle our mobile payments. Since I am a wannabe security expert (hell bent angry consumer) I want others to be safe; merchants, and the customers.

Unlocked, or rooted phone?

You may think that having an unlocked, or rooted phone is cool. If you think that dismantling the entire Operating System and leaving yourself wide open for malware or viruses,…then cool story bro. The rest of us who are informed and aware of the risks won’t be about that life.

According to Tim Armstrong, a security specialist at Boston-based Threat Stack “A lot of people don’t realize what they’re doing,” he said. “When you launch the jailbreak, you’re defeating the security of the phone. Once you do that, every application has full access to the phone and you put trust in the people who create the apps.”

There is no longer any antivirus software available for the Apple iOS, and the few products that did exist were limited in their abilities. “That’s because Apple locked down the operating system,” Armstrong said. “But if you jailbreak your iPhone, it’s buyer beware.”

Long story short; if you jailbreak your iPhone, or root your Android, you’re on your own. There’s no program that can protect you from infection, other than Jailbroken apps, which are not always supported in new versions of the Apple iOS, and each system update pushed out by Apple usually will erase jailbroken apps that depend on them. You’ll have to jailbreak the device again, reinstall the unauthorized apps and hope they all still work.

Do Customers even notice or think about security?

A study by Auriemma Consulting Group revealed about one-third of customers who make purchases via mobile payments were worried about security. Customers (myself, and anyone I associate with) won’t use a payment reader that looks outdated, on the mall wi-fi or showing any hint of being unsecured. If your customers see things as sketchy, you’ve not only lost a sale, but also on future sales, and maybe even referrals.

How to stay safe with mobile payments

It is paramount to be even more careful with mobile payments than the typical POS (Point of Sale). A POS is safer because it is running behind a firewall. Smartphones are not classified as a dedicated hardware for payments because they were not designed with that in mind.

A very scary reality is that older and outdated card readers are still in circulation and processing payments successfully. A customer is not going to know whether the reader is up to date and PCI compliant or not.

You should REQUIRE the following information for any mobile or over the phone payments;

  • Complete card number
  • Expiration date
  • Security code / CVV code
  • Billing zip code

Key Practices for phone / mobile payments.

1. On the signature line of the printed receipt for the order, instruct your staff members to write “Phone order.”

2. Keep the paper receipt filed with the rest of your receipts and invoices.

3. Do not use a payment option that allows for PIN entry directly into the device, it should only happen with an encrypted PIN pad.

4. Second bank account for mobile payment events, less risk, keeps the rest of the customers safe.

5.Make sure that you are using a password and not auto signing in

6. Phones are very prone to ransomware, from downloads or web pages visited. Business doesn’t mix with pleasure right? This is NOT ant different.

7. Set up phone with the ability to wipe it clean remotely in the chance of loss or theft.

8. Disable auto fill so you are not storing customer information.

9. Don’t even consider using a public wi-fi connection.

If you take one thing away from this blog post, take the fact that doing any and all software updates are paramount for security.

In the year that I have been with Platinum Payments, I have spoken with many many business owners, attended events and learned to see a plethora of red flags, warning signs and where business owners are lacking. I have witnessed first hand (ahem, farmers market) how many merchants are doing the opposite of what safe is. It is incredible to me to see business owners taking so much risk, when it is so simple to be compliant and secure.

One issue that is prevalent with our competitors is they are trying to saturate the market and push for sales, Platinum Payments is taking the time to make sure the security is a top priority. We look out for EVERYONE, not just “our” customers. Even if you don’t like what I have to offer, I would bet that you at least learned something you didn’t know before and ways to implement that new education you just got schooled with.

If one phone call could ensure your business is still standing to see another fiscal year, isn’t that worth the time it would take to talk to someone who does this full time? One call could help you save everything in it’s entirety due to PCI, customer retention, ways to increase revenue, account monitoring, custom built plans, phenomenal customer support, and then maybe even save some money. You do you, let me do the rest.

Processing and Profit

Processing and Profit

Processing and Profit: Part of business 101 is increase sales, decrease costs, on top of trying to improve customer service and retention. When looking to decrease costs, processing is an area that is often overlooked.

Termination Fees

Business owners usually met with roadblocks, contracts and/or early termination fees.

A great solution is Interchange Optimization, which automatically recognizes the most cost effective way to process a transaction, meaning the business will get the lowest rate every time, in turn saving a hefty amount.

Margin Increase

Interchange fees are the bulk of fees for processing a single transaction. Merchants know these fees exist, but most do not know how or why they are there, or how to reduce them.

Interchange rates are non-negotiable, but you can minimize cost by improving qualification rates using a cloud-based solution. There are 3 different categories to process through. Level 3 requires the merchant to enter more information. The added information helps decrease risk, which allows for processing at a lower rate to be possible.

Adding to fees set by the bank and credit card companies, as of January 27, 2013, the government allows merchants to charge customers either a convenience fee or surcharge fee for processing credit cards.

“Cash Discount” Programs

Surcharges are fees added by merchants to cover charges incurred from a credit card transaction. Convenience fees are added by merchants for allowing customers the option for their customers to pay in a way that isn’t considered standard.

It is enticing to some business owners to add surcharges or convenience fees as a way to help offset the cost. In doing so, they run a high risk for violating a number of rules since state laws are widely different. Sometimes these fees do more harm than good as far as customer retention and relationships go.

Correct Practices Save Money

With correct transaction practices there should not be a need to tack on more fees.

By automating processing businesses can reduce the risk of breach and improve security. Doing so minimizes cost, as well as giving customers peace of mind that their information is secure.

Two security practices are end-to-end encryption and tokenization. End-to-end encryption ensures that sensitive card data is protected from the card swipe until it is unencrypted on the receiving end. Tokenization is the process of scrambling the information being sent to reduce the risk of exposure.

Conclusion

When a business streamlines their payment experience, they will experience an increase in profit margins. Business owners who take the time to look for solutions that meets their needs they can be rewarded by an increase in sales, decrease in costs, and most importantly, customer retention. Platinum Payments helps with that. We tailor the experience to help with customer success, processing experience, and profit increase.

Find out more on how your business can increase profits.

Best Business Practices

test alt text

If you take a card in any capacity, this applies to YOU; here are a few tips and best practices:

1. Be Up To Date With Software and Equipment

With the various types of POS systems, it is in your best interest to make sure that you have PCI compliant equipment and software. Using outdated or non EMV capable equipment may seem like a good idea to save on upgrade costs, but it is actually a huge liability.

2. Don’t Store Customer Payment Card Data

Never. Never. Never store card data. Storing card information could cost you your business, the longer that information is there, the greater the risk that it could get into the wrong hands. Staples Business Hub explains. “That’s one reason why it’s preferable to securely dispose of any payment information immediately following a transaction.”.

3. Develop Employee Handling Policies

Since employees are the ones handling the cards they will need to be trained to do so the correct way to help minimize cost. All employees should know what is involved in a transaction and how to take card information correctly. Another useful tip is to teach employees the different signs to look for to help avoid fraudulent activity.

4. Always Verify Shipping and Billing Addresses

It is imperative to make sure the billing and shipping addresses match, especially if the card is not present. UPS has a great tool to use called address validator that is free to use if you are unsure whether the address is legitimate or not.

5. Be Extra Careful With Online Purchases

Online purchases should never be done using a public wifi network. Only fill out the required fields, sometimes there is unnecessary information being requested, which can open things up to fraud and identity theft. The retailer is the sole entity liable for fraudulent online purchases. Most businesses could not recover from such devastation.

Conclusion

Taking cards sounds scary and maybe even too much of a risk. We assure you, it is not as daunting as it seems. We make sure that you have the facts and steps to take to protect yourself, and your customers. Checks have already phased out, other methods are not far behind. When you are processing with Platinum, we have your back and will do what we can to ensure that you are safe.

EMV Compliance Defined

EMV PCI Compliance Defined

In 2015 the United States finally caught up with the world and began using EMV, or chip cards. Having EMV compatible equipment became part of the PCI regulations or EMV PCI Compliance, with the exception of gas stations, which had a two-year extension.

The key component of EMV is the chip, which holds the encrypted information on integrated circuits, as well as the magnetic strip. As of October 1, 2015, all card issuers shifted the liability to the consumers/business owners. Gas stations will have until October 1, 2020, to be EMV compliant for pay at the pump at any point of sale.

EMV cards solve this problem with smart chips—that silver square located on the card.

Rather than being swiped into a card reader, EMV chip cards are dipped into compliant readers so that the reader interacts with the chip. The square chips on the edge of EMV cards ensure that the card generates one-time transaction codes unique to each purchase.

This process, known as tokenization, obscures the purchaser’s actual credit card number during the purchasing process so that the chip reader only sees random alphanumerical strings. After the smart chip communicates to the card processor to verify and authenticate purchase and availability of funds, the transaction is processed. Plus, EMV technology allows customers to pay securely via their smartphones and smart devices using NFC radio wave technology with compatible EMV readers.

Having the correct equipment for your business, as well as being able to read EMV are two very vital practices to keep your business and customers safe.

The encryption that comes with EMV scrambles the information from end to end. The data being sent cannot be read until it reaches its destination. When you are using a EMV reader, in addition to EMV cards it is that much harder for that information to become compromised.

The end to end encryption is why having the correct equipment is crucial. The free reader you picked up somewhere probably doesn’t have any encryption at all. It is especially worrisome for mobile payments where someone is also using their personal phone to take payments.

To learn more about EMV check out our blog.

A Guide To Understanding PCI Compliance

understanding PCI compliance

Understanding PCI compliance

Platinum Payments takes the security of their clients and their customers very seriously that’s why understanding PCI compliance is important.

What is PCI? PCI stands for: Payment Card Industry Compliance, which are the standards which all businesses that use credit card processing should follow to ensure that credit card data protected.

The PCI Security Standards Council’s mission is to enhance global payment account data security by developing standards and supporting services that drive education, awareness, and effective implementation by stakeholders.

It can seem daunting or overwhelming, or maybe just too time consuming. These simple steps show how simple it really is.

Tips to help with Understanding PCI compliance.

1. Business owners should complete an annual online assessment once a year to be compliant. Our customers use the PCI Compliance Manger.

2. Having updated equipment and software. While we understand that a merchant doesn’t want to have to buy new equipment or software. The problem with that is, it most likely is very outdated and can become a liability for your business. We have the latest technology and can help.

3. Always. Always. Always. Make sure that your Wi-Fi network is separate than a network that is used by patrons.

4. Change passwords regularly

5. Ask your Professional Consultant for help or additional training

To learn more about Understanding PCI compliance check out our blog!

Face App and PCI: Viral or Virus?

Face App and PCI: Viral or Virus?

Regarding FaceApp

Everyone has either seen something regarding FaceApp, or even downloaded and it and used it themselves. It is trending significantly among smartphone users. With the popularity of Snapchat and other apps, it’s no surprise that an app that adds filters, or uses AI to modify the photo is making the rounds yet again. Same idea, different app name.

Why should we be concern?

While people are so eager to download Faceapp a harmless app, without even reading the terms and conditions that apply, such as whoever created the app now owns your digital media and can do whatever they want with it, whenever they want, and however, they want. Phishing, selling information, and targeted advertising. All things that are done electronically, and most data coming from apps that users have installed and given away all rights to privacy unknowingly. These apps like FaceApp keep coming along from money-driven developers. They know that someone will download their app, give free rein of their device, which can then be sold to other companies and turn a huge profit.

Face App and PCI: Viral or Virus? It all links back to security and privacy.

Continuing to process with a company, who didn’t really go into detail about their new Terms and Conditions, you have technically agreed to whatever they have decided to modify and throw in there. Downloading an app, you have agreed to whatever they have listed in their terms and conditions.

When you are not PCI Compliant or using Safe-T, the chance that someone can hack into your system and steal information is a major risk. Agreeing to a companies terms, that does not include keeping you up to date with encryption, PCI, or EMV is a disaster waiting to happen.

According to Insurance Journal: “More than half of U.S. businesses (53 percent) have experienced a cyber attack in the past year, according to a survey of business executives. The nationwide survey, released by The Hartford Steam Boiler Inspection and Insurance Co. (HSB), part of Munich Re, found that of those businesses hacked in the previous 12 months, 72 percent spent more than $5,000 to investigate each cyberattack, restore or replace software and hardware, and deal with other consequences.”

Digital information is bleeding out everywhere you look, allowing that to happen to your business, your life, your customers, its all in bad form. We make sure that that will not happen. We care about your privacy and the privacy of your customers.

We take all the detective work out of security and privacy so you are able to enjoy a simple and easy card swipe.

It isn’t a hard decision to make, pick a company that truly cares and is in it for the long haul, not just for the here and now. We care about your long term goals and future because honestly, our future depends on it.

Let us help you become PCI compliant in addition to protecting yourself and your customers.

Table Side Payments

Table Side Payments

Paying with checks used to be the norm, which transformed to paying with a swiped debit card, it then evolved into chip cards, tap and go and apple or android pay. The next thing to become more common and be the new normal is Pay At The Table Side..

Payments

We’ve all been to a restaurant that has paid at the table as an option. It saves so much time and hassles for each party involved. With fraud so prevalent and becoming more and more of a threat each day, there are a lot of businesses who are looking to switch to tableside payments, not only for the safety and security of themselves and customers but also for the ease and time it saves.

As a business owner, maybe you have looked into tableside payments but are unsure of what the best option is, concerns of cost, leaning a new system, or feelings of being bombarded with things that actually won’t serve the business in a positive way, which can leave you feeling overwhelmed and upset.

Elavon has stated: “…69% of American diners report that the most frustrating part of eating out is waiting for the check at the end of the meal.[ii] At a full-service restaurant, it can take up to 12 minutes from the time a customer requests the check to the time they actually end up paying it,[iii] which can seem like an eternity to many patrons. Implementing a pay-at-the-table solution provides exactly the kind of speed and convenience your guests want.”

Solutions

At Platinum Payments, we have many affordable ways to bring tableside payments and security to give merchants and their customers’ peace of mind that their information remains secure and protected. Our table-side payment solutions are very user-friendly and can do everything from employee management, tracking inventory and products used to make ordering even quicker.

Our professional consultants are trained in the latest technology and up and coming products to be able to better serve others. Get ahead of competitors and offer customers tableside payments which can help increase customer loyalty since they will know how much you value their time and sensitive information.

Our consultants and customer service will be there every step of the way to make sure that you have been adequately trained on the product and teach you how to maximize the flow to a steady and efficient process.

Strategic Partnership | 4 things you should look for

Strategic Partnership

So why partnerships may be the key to true organic and stable growth for your business?

As the NFIB Blog states: “Strategic business partnerships allow small businesses the opportunity to grow their customer base and improve their business”, and I’d like to add that it also helps big businesses reach customers they wouldn’t be able to reach otherwise through small businesses.

So let’s talk about the things to look for.

1. Great Reputation

Great reputation with customers and other businesses are vital to enhancing YOUR reputation when partnering up with a company for the first time. Always check on reviews and what the majority of customers may be saying about the company. Check to see their website and brand. Is the brand parallel to what YOU want to be doing in your business?

2. Right Co-Marketing

Co-marketing is very important. If it’s done right it may help increase the brand awareness and enhance the service you are providing to your customers. Remember, marketing has to be done with the PLATINUM rule: [Market to] others the way they want to be [marketed to].

Correct co-marketing consists of a couple of things: 1. Value – Give as much value as you can in the least amount of time, kind of like a multi-vitamin pill…but this will actually work. 2. A clear offering – Make sure your offering is connected to the “multi-vitamin” you put up before that so that the person makes sense out of the content and it leads to action. 3. CTA – Call-to-action is something people miss all the time. They do everything else right…until it’s time to “ask” for the sale.

3. Meet each other’s needs

Your time is valuable and so is your potential partner, so make sure that both of you are getting the most out of it. Talk clearly to your potential partner so that you understand their point of view and what responsibilities you both will have and what the benefits will be – will there be compensation? increase in sales? additional revenue stream? and most importantly, how will all this be done? Familiarize yourself with their process to reach those goals!

4. The right partnership

Inc Magazine talks about their lack of success in choosing the right partnership. This could happen to anyone, but it is important to follow the first three steps first to make sure things are being talked about clearly.

I believe the key to a successful partnership is an open channel of communication that allows both parties to talk about issues that may be fixed before it’s too late. Just remember that it’s imperative to make sure there’s a win-win-win situation: Company wins-Your company wins-customer wins!


Feel free to connect with me through my LinkedIn Profile if you have any questions about partnership opportunities that you may be looking at!

Data Privacy Policy Agreement.

Applicant Privacy Policy
English


Legal Disclaimer
Effective Date: January 1, 2021
This Applicant Privacy Policy (the “Policy”) describes the practices of Platinum Operating Company, LLC d/b/a Platinum Payments (“Company”) regarding the information that is solely collected through the Platinum Workforce Now portal (“Careers Site”) in connection with your application for a job or internship with us.


1. CATEGORIES OF INFORMATION WE COLLECT THAT YOU PROVIDE
We may collect the following information from you in connection with your application through the Careers Site: Name, e-mail address, mobile number, work authorization status, resume, profile information (e.g. work experience, education, skills, licenses & certifications, and memberships), professional and other work-related licenses, permits and certifications, references, and any other information you elect to provide to us (e.g., employment preferences, willingness to relocate, current salary, desired salary, awards, or professional memberships).
If you do not provide sufficient information, we may be unable to consider your employment application.
However, please avoid submitting the following information that may qualify as sensitive information under applicable law, except where such information is legally required: information on race, religion, ethnicity, nationality or national origin, age, gender identity, sex life or practices or sexual orientation, marital status, medical or health information (including disability status), genetic or biometric information, biometric templates, political or philosophical beliefs, political party or trade union membership, background check information, judicial data such as criminal records or information on other judicial or administrative proceedings, and veteran status.
If the personal information you provide contains details of the information referenced in the preceding paragraph or your job evaluations or educational records, you authorize us to handle such details for the purposes of your job application.
Any information you submit through the Careers Site must be true, complete and not misleading. It is your responsibility to ensure that information you submit does not violate any third party’s rights.
If you provide us with personal information of a reference or any other individual as part of your application, it is your responsibility to obtain consent from that individual prior to providing the information to us.


2. USE OF INFORMATION / LEGAL BASIS
We collect and process information about you for the following reasons:
a) Because you voluntarily provide this information;
b) Because this information is necessary to take steps at your request prior to entering into an employment or internship;
c) Because this information is of particular importance to us and we have a specific legitimate interest under law to process it;
d) To comply with a legal obligation; or
e) Where necessary to protect the vital interests of any person.
The information that you submit on the Careers Site will be used for our personnel recruitment, management, and planning purposes, as permitted by local law, including:
• To process your application;
• To assess your capabilities and qualifications for a job;
• To conduct reference checks;
• To respond to your inquiries and communicate with you about your application, and to send you information regarding the Careers Site and changes to our terms and policies;
• To comply with or monitor compliance with any applicable law or regulation;
• To conduct background checks if we offer you a position; and
• To preserve our other legitimate interests, for example, for our administrative purposes, aggregate management reporting, internal training, and as generally required to conduct our business.
The information about you will be added to our candidate database. If you do not wish us to do this, please contactwendy.clawson@ptpay.us.
If we hire you, personal information we collect in connection with your application may be incorporated into our human resources system and may be used to manage the new-hire process; any such information may become part of your employee file and may be used for other employment-related purposes.
We may also use the information as we believe to be necessary or appropriate: (a) under applicable law, including laws outside your country of residence; (b) to comply with legal process; (c) to respond to requests from public and government authorities including public and government authorities outside your country of residence; (d) to protect our legal rights and operations or the rights, privacy, safety or property, and/or of us, you, or others; and (e) to allow us to pursue available remedies or limit the damages that we may sustain.


3. DISCLOSURE OF PERSONAL INFORMATION
We may share personal information with affiliates and/or partners that are involved in and/or for performing pre-employment, post employment processes in compliance with state and federal law, evaluating candidates for a given position and to track employee and/or contractor performance and progress. We will make the information available to personnel with a business need to know the information, including personnel in the recruiting, human resources, and information technology departments, and in the department responsible for the position for which you are applying and for which you, if hired on an employee or contract basis, hold.
We may share personal information with third-party service providers who provide services such as hosting and operating the Careers Site, recruiting assistance, background check processing, Work Opportunity Tax Credit, eVerify, Equal Employment Opportunity Commission, and any other governmental programs the business elects for voluntary or compliance purposes and similar services.
We also may share personal information as we believe to be necessary or appropriate: (a) under applicable law, including laws outside your country of residence; (b) to comply with legal process; (c) to respond to requests from public and government authorities including public and government authorities outside your country of residence; (d) to protect our legal rights and operations or the rights, privacy, safety or property, and/or of us, you, or others; and (e) to allow us to pursue available remedies or limit the damages that we may sustain.
We may transfer information in the event of any reorganization, merger, sale, joint venture, assignment, transfer or other disposition of all or any portion of our business, assets or stock (including in connection with any bankruptcy or similar proceedings).
Disclosing your personal information may include transferring personal information to other countries (including countries other than where you are based that have a different data protection regime than is found in the country where you are based). If you are located in the European Economic Area (the “EEA”), this may include countries outside of the EEA.


4. DATA RETENTION
We keep your personal information for as long as needed or permitted in light of the purpose(s) for which it was obtained. The criteria used to determine our retention periods include (i) for as long as we have an ongoing relationship with you (such as an application process); as required by a legal obligation to which we are subject; or as advisable in light of our legal position (such as in regard of applicable statutes of limitations, litigation, or regulatory investigations).
We may remove personal information for inactive accounts, subject to any applicable legal or regulatory obligations. Furthermore, we may delete personal information about you (including your CV/résumé) from our database at any time and without providing any reason. Therefore, please retain your own copy of the personal information provided to us.


5. PASSIVE INFORMATION COLLECTION: COOKIES AND TRACKING TECHNOLOGY
When you visit the Careers Site, we collect certain information by automated means. Cookies are small text files that websites send to your computer or other internet-connected device to uniquely identify your browser or to store information or settings in your browser. Cookies allow us to recognize you when you return. They also help us provide a customized experience and enable us to detect certain kinds of fraud. In many cases, you can manage cookie preferences and opt-out of having cookies and other data collection technologies used by adjusting the settings on your browser. All browsers are different, so visit the “help” section of your browser to learn about cookie preferences and other privacy settings that may be available.
We also use Flash Cookies (also known as Local Stored Objects) and similar technologies to personalize and enhance your online experience. The Adobe Flash Player is an application that allows rapid development of dynamic content, such as video clips and animation. We use Flash Cookies for security

purposes and to help remember settings and preferences similar to browser cookies, but these are managed through a different interface than the one provided by your web browser. To manage Flash Cookies, please see Adobe’s website at http://kb2.adobe.com/cps/526/52697ee8.html or visit www.adobe.com. We do not use Flash Cookies or similar technologies for behavioural or interest based advertising purposes.
Pixel tags and web beacons are tiny graphic images placed on website pages or in our emails that allow us to determine whether you have performed a specific action. When you access these pages or open or click an email, the pixel tags and/or web beacons generate a notice of that action. These tools allow us to measure response to our communications and improve our web pages and promotions.
We collect different types of information. For example, we collect information from the device you use to access the Careers Site, your operating system type, browser type, domain, and other system settings, as well as the language your system uses and the country and time zone where your device is located. Our server logs also record the Internet Protocol (“IP”) address assigned to the device you use to connect to the Internet. An IP address is a unique number that devices use to identify and communicate with each other on the internet. We may also collect information about the website you were visiting before you came to us and the website you visit after you leave the Careers Site.
In many cases, the information we collect is only used in a non-identifiable way, without reference to personal information. For example, we use information we collect about website users to optimize the Careers Site and to understand website traffic patterns. In some cases, we associate the information we collect with your personal information. This Policy applies to the information when we associate it with your personal information.

Although the Careers Site currently does not have a mechanism to recognize the various web browser Do Not Track signals, we do offer individuals choices to manage their preferences that are provided in the previous sections above. The Careers Site does not collect personal information about an individual’s online activities over time and across different websites when a consumer uses the Careers Site. To learn more about browser tracking signals and Do Not Track please visit http://www.allaboutdnt.org/. We use Google Analytics as a third-party vendor. For information on how Google Analytics uses data, please visit “How Google uses data when you use our partners sites or apps”, located at http://bit.ly/2jXZ13Y. We also use Pendo as a third-party vendor. For information on how Pendo uses data, please visit https://www.pendo.io/privacypolicy/.

 

6. ACCESS AND CORRECTION
If you register on the Careers Site, you may access, review, and change your personal information stored therein by logging into the Careers Site and updating your account information. However, if you have authenticated your login via a mobile number or email address, such information cannot be updated in the same login session.
We encourage you to promptly update your personal information if it changes or is inaccurate.
Apart from information contained in your profile, where permitted by applicable law, you may request (i) access to personal information we collect, (ii) its modification or suppression, (iii) that we restrict its processing, (iv) that we cease using it (objection right); (v) that we transfer personal information to you or another organization in a structured, commonly used and machine-readable format (right to data portability), and/or (vi) that we not sell any such information. Please email us at wendy.clawson@ptpay.us
or contact us at 1483 Wall Ave, Ogden, UT 84404 with any such requests.
For your protection, we may only implement requests with respect to the information associated with the particular email address that you use to send us your request, and we may need to verify your identity before implementing your request. We will try to comply with your request as soon as reasonably practicable. Please note that certain personal information may be exempt from such access, correction, or suppression rights pursuant to local data protection laws.


7. SECURITY
We use reasonable organizational, technical and administrative measures to protect personal information within our organization. Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure. If you have reason to believe that your interaction with us is no longer secure (for example, if you feel that the security of any account you might have with us has been compromised), please immediately notify us of the problem by contacting us in accordance with the “Contact Us” section below.
We hereby disclaim, as far as permitted by local laws, any liability for us and our affiliates and contractors for any personal information we collect in connection with your application that is lost, misused, illegally accessed, disclosed, altered or destroyed or not timely delivered to our Careers Site.

 

8. LINKS TO THIRD-PARTY WEBSITES
The Careers Site may contain links to other websites. This Policy does not address, and we are not responsible for, the privacy, information or other practices of any third parties, including any third party operating any website or service to which the Careers Site links. The inclusion of a link on the Careers Site does not imply endorsement of the linked site or service by us. We encourage you to read the legal notices posted on those sites, including their privacy policies.


9. LAW APPLICABLE TO JOB APPLICATION
This Careers Site is operated from ADP Workforce Now in Dallas, TX. Accordingly, any personal information you submit to the Careers Site will be collected in ADP Workforce Now in Dallas, TX and will be subject to state of Texas laws.
The Careers Site is not intended for distribution to, or use by, any person or entity in any jurisdiction or country where such distribution or use would be contrary to local law or regulation.


10. ABOUT CHILDREN
The Careers Site is not intended for individuals under the age of 18.


11. CHANGES TO THE POLICY
We reserve the right to amend this Policy at any time in order to address future developments, the Careers Site, or changes in industry or legal trends. We will post the revised Policy on the Careers Site or announce the change on the homepage of the Careers Site.
You can determine when the Policy was revised by referring to the “Last Updated” legend on the top of this Policy.
Any changes will become effective upon the posting of the revised Policy on the Careers Site. By continuing to use the Careers Site following such changes, you will be deemed to have agreed to such changes.
If you do not agree with the terms of this Policy, in whole or part, you can choose to not continue to use the Careers Site.

 

12. CONTACT US
If you have questions or requests, please feel free to contact us at info@ptpay.us or USPS address at 1483 Wall Ave, Ogden, UT 84404.