Name Change Illinois - Privacy Policy
Our Name Change Illinois service values your privacy and has a dedicated privacy policy to safeguard it. At Name Change Illinois, we are committed to protecting your personal information and ensuring that it is not shared with third parties or sold. This is the central tenet of our privacy policy.
We hold utmost respect for your privacy. We do not disclose, lease, sell, or distribute personal information to any third parties. The only information we gather is through indirect means, such as cookies, analytics programs, or web server logs.
Service Requirements and Privacy
To utilize our services, we will require your email address. However, rest assured that we will solely use it to send you emails pertinent to your account and updates regarding our website. If you wish to unsubscribe from these messages, kindly email us at .com with "unsubscribe" in the subject line, and we will promptly remove you from our email list.
Your financial information, such as your credit card number, will solely be utilized for charging you for the chosen service package. Once your order has been processed, we will securely delete your financial information from our system. We guarantee that we will never store or sell your financial information.
At Name Change Illinois, we prioritize the protection of your personal information. Only customers with their individual passwords can access their private information. Moreover, we employ advanced technology to encrypt your data before transmitting it from your browser to our web server.
Please note that this privacy policy, along with the terms of service, solely applies to your experience on this website. When visiting other websites, it is essential to review and agree to the terms and privacy policies of our affiliates and advertising partners.
Name Change Illinois is committed to maintaining the integrity and confidentiality of information and systems by continuously evolving our practices.
We utilize state-of-the-art security measures to protect our networks and websites from any potential misuse, alteration, copying, disclosure, destruction, monitoring, unauthorized sharing of information, or damage. To ensure protection, we utilize security software and encryption protocols. Our security measures encompass physical, technical, and procedural controls that work in tandem to safeguard the information provided by our users.