SUMMIT INDUSTRIES CORPORATION, d/b/a School Check IN, is a Florida Corporation, hereinafter known as “SUMMIT”. SUMMIT is committed to protecting the privacy of our customers’ data. A customer collectively refers to school districts, individual schools, or students attending schools, or employees, or volunteers, or parent/guardians or vendors or visitors of any district and/or school that use SUMMIT’s MySchoolPTC Software Application.
1. Commitment to Customer Data Privacy
SUMMIT is committed to safeguarding our customers’ data by adhering to relevant data privacy laws and regulations and contractual commitments to our customers.
2. This Policy Applies to SUMMIT Customers
This policy applies to the services and products offered by SUMMIT and binds all our employees. This policy refers to data from our Customers or the students, employees, volunteers, parent/guardians, visitors and vendors of our Customers and in this policy, we may refer to this group of individuals as “you”, or “Customers”.
3. What Information Is Collected And How Is It Collected?
SUMMIT collects customer data about you when you purchase, use or benefit from SUMMIT’s services or products.
“Data” includes information that will allow someone to identify or contact you, including, for example, your full name, address, telephone number or email address.
Data also includes aggregated data or data that, by itself, does not permit the identification of individual persons, such as statistics on the number of people visiting the SUMMIT website each month.
You provide certain data to SUMMIT when, for example, you: (a) call our technical support; (b) contact us to receive security consultancy and security services; (c) order services and products from SUMMIT websites; (d) submit forms through our web sites; (e) access services through a downloadable electronic application for mobile devices (“App”); or (f) make inquiries, requests or complaints.
Subject to your agreement to the applicable terms and conditions, you may access services through the SUMMIT application, including security information and other services which may be added by SUMMIT from time to time.
The SUMMIT application provides information, including your or your organization’s SUMMIT Customer Number as well as the email address of your mobile device. To enable location-specific services, the App also collects and divulges yourlocation. The App also periodically provides information concerning your usage of particular SUMMIT’s application features.
When you choose to pay for SUMMIT services or products by credit card directly from the SUMMIT website, you will berequired to provide the name on the credit card, credit card number, expiration date and other security information. When you choose to pay for SUMMIT services or products by other means, we may ask you for your credit card details, contact details and bank account details, if needed.
You also provide information to us when you choose to email data to us or you participate in marketing and sales initiatives. SUMMIT will only gather data that is relevant for the purposes for which it will be used and will not gather excessive or unnecessary data. SUMMIT shall take reasonable steps to ensure that data is reliable, accurate, complete, and current, bearing in mind its intended use. You have a responsibility to keep the data you provide to us updated, and we will take reasonable steps to facilitate this.
For a complete list of Data used in SUMMIT’s MySchoolPTC Software Application, please contact SUMMITat firstname.lastname@example.org
Data is primarily provided by the district/school in order to use SUMMIT’s MySchoolPTC Software Application. Some data is collected when
- students and/or adults check in or check out at the school;
- log into the MySchoolPTC web site (www.myschoolptc.net);
- complete the online volunteer application in VolunteerPLUS;
- purchase products or supplies from SUMMIT or by contacting SUMMIT by phone or email.
4. Data Access And Maintenance
SUMMIT provides data access to only active and paid subscription customers. Customers can only access data for their district and/or school. The customer’s data is available and active through a SSL secure web login process with secret passwords.
On servers hosted by SUMMIT and used by the Customer, SUMMIT has responsibility to maintain the Customer’s data, including data backups. Full backups are done daily. Data “snapshots” are donethroughout the day.
Customers are responsible for a) keeping all passwords secret; b) all data management and data security held on the Customer supplied computers used at the schools to check adults and/or students in and out. This includes all Customer data held in SUMMIT’s MySchoolPTC “client” software application installed on the Customer supplied computers. It is Customer’s responsibility for all updates, upgrades, anti-virus security, windows updates/patches and network connections, and Internet access connections. Customer agrees to provide SUMMIT with remote access to the Customer check in/out computers (Client), if needed.
5. Termination Of Services
Should SUMMIT terminate Customer services and/or the Customer terminates services with SUMMIT, then the Customer will no longer be able to log in and create and/or run any reports or view data, delete data or edit data. If service is terminated, Customer agrees to discontinue using SUMMIT’s MySchoolPTC software application and to delete and remove SUMMIT’s MySchoolPTC software application installed on any Customer computers.
Data will be held in the SUMMIT active database for 90 to 180 days after termination of services. Once SUMMIT removes the Customer’s data from the SUMMIT active database, the Customer’s data will be moved to an off-line inactive database and held for two (2) years. After two (2) years, Customer’s data will be archived to a zip password protected storage.
If after termination of services, a Customer has a need to access Customer’s data, then Customer can submit a written request for such access. Customer’s request must provide specific details regarding the data requested. SUMMIT, if possible, will provide results in a standard SUMMITMySchoolPTCreport. Districts and/or Schools will be charged a reasonable expired data access fee. The expired data access fee must be paid prior to release of any data.
6. Access / Sale / Share Of Customer Data
SUMMIT will not:
- Allow access to Customer data by any third party
- Sell and/or trade Customer data to any third party
- Share Customer data with any third party.
7. Acceptance and Links to other Websites
This SUMMIT website may contain links to other websites, which are provided solely as a convenience to you and not as an endorsement by SUMMIT to other web sites’ content. The other web sites may have their own policies, which
9. How Data Will Be Used
SUMMIT uses the Customer’s data to primarily track when people (adults and students) check in and/or check out at a school. This is done to enhance Customer’s school security.
SUMMIT will use the Customer’s data to provide you with services and products that: (a) you purchase; (b) are purchased by your employer; (c) are purchased by an association or institution (including an educational institution) of which you are an employee or a member.
The data collected from the SUMMIT’s MySchoolPTC software application enables SUMMIT to provide better and more relevant Customerservices. Location information collected is used to provide security alerts and other security information. The information is used to help SUMMIT better understand how you make use of SUMMIT’s MySchoolPTC software application in order to make improvements to it.
10. Student Data Privacy
SUMMIT only collects information on students who are students in the district/school and only with the permission of the Customer.
11. How Customers Can Correct Inaccuracies in The Data?
You can review Customer data by logging into www.schoolcheckin.net with your user name and password to access your data. Customers can add, edit and/or delete their data.
12. SUMMIT’s Security Procedures Used To Protect Customer’s Data
SUMMIT takes precautions to protect its Customer’s information. SUMMIT has implemented policies that forbid its employees from using or disclosing Customer data in an inappropriate or unlawful manner. SUMMIT maintains security measures to safeguard Customer data from unauthorized access, misuse, alteration, loss or destruction.
Information Collected By Electronic Means
When Customer provides SUMMIT with data through online forms and other electronic methods, the data is protected using industry-standard encryption.
Security of Premises and Other Physical Security Measures
Physical access to all SUMMIT offices and server hosting offices are security controlled, which include locks that are opened by keys and/or by using security cards and/or security card readers that record the identity of employees and visitors entering or leaving the facilities.
Information systems containing sensitive information and communications equipment are placed in secure areas and protected by additional physical security measures that permit access only to the employees who need access, operational processes, environmental controls and fire detection and suppression systems to safeguard against accidental loss, theft or unauthorized removal, misuse, damage or unauthorized access.
Security Against Unauthorized Electronic Access and Viruses
- All gateways to the Internet are firewall protected, and access to both internal and external networks are restricted and controlled.
- All servers are hardened based on security hardening standards to protect against network threats
- Endpoint security is constantly being review to protect the network against unauthorized access, data loss or destruction.
- Access to computer services and information is on a ‘roles and responsibility’ basis and is restricted and controlled based on business requirements to reduce the risks associated with misuse, such as alteration, destruction and unauthorized dissemination of data.
- Access to information services is through a secure login process with a unique identifier.
- User access to our management system and essential network services are controlled using a user rights management system that utilizes employees’ roles in assigning user access rights, especially to the case management system.
- All remote access is given on a needs basis and is via a two-factor authentication mechanism.
- Mobile devices have password policy controls, and remote device hardware reset features enabled to protect against lost or stolen devices.
- Before being approved, changes to production systems and network follow a change management process flowto ensure that changes are assessed for risk and operational impacts.
- Critical servers are scanned using network and system vulnerability scanners.
- Web applications are also scanned by automated penetration tools for application level security vulnerabilities that may be susceptible to hacking.
- External vulnerability scanning on our Internet facing sites are performed to ensure that these sites are secure. This is done using in-house vulnerability scanning tools and third party services.
- Penetration tests are also performed on our key Internet applications prior to production or major upgrades.
- SUMMIT engages external consultants to conduct security review of our environment. These reviews help us to understand the security gaps and ensure that our infrastructure and applications are able to meet and mitigate new network and Internet security threats and risks.
13. Changes to this Statement
All site design, text, graphics, interfaces, and the selection and arrangements thereof are copyrighted at © 2016 – 2017MySchoolPTC — All rightsreserved. Permission is granted to electronically copy and to print hard copy portions of this site for the sole purpose of placing an order with MySchoolPTC. Any other use of materials on this site without prior written permission of MySchoolPTC is strictly prohibited. This includes, but is not limited to, reproduction for purposes other than those noted above, or modification, distribution or republication.
All trademarks, service marks, and trade names (collectively the “Marks”) are proprietary to MySchoolPTC or other respective owners that have granted MySchoolPTC the right and license to use such Marks.
THE INFORMATION, SERVICES, PRODUCTS, AND MATERIALS CONTAINED IN THIS SITE, INCLUDING, WITHOUT LIMITATION, TEXT, GRAPHICS, AND LINKS, ARE PROVIDED ON AN “AS IS” BASIS WITHOUT ANY WARRANTY. TO THE MAXIMUM EXTENT PERMITTED BY LAW, MySchoolPTC DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO SUCH INFORMATION, SERVICES, PRODUCTS, AND MATERIALS, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENT, FREEDOM FROM COMPUTER VIRUS, AND IMPLIED WARRANTIES ARISING FROM COURSE OF DEALING OR COURSE OF PERFORMANCE. IN ADDITION, MySchoolPTC DOES NOT REPRESENT OR WARRANT THAT THE INFORMATION ACCESSIBLE VIA THIS SITE IS ACCURATE, COMPLETE OR CURRENT. Price and availability information is subject to change without notice.
Limitation on Liability:
IN NO EVENT, SHALL MySchoolPTC BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER, EVEN IF MySchoolPTC HAS BEEN PREVIOUSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, WHETHER IN AN ACTION UNDER CONTRACT, NEGLIGENCE, OR ANY OTHER THEORY, ARISING OUT OF OR IN CONNECTION WITH THE USE, INABILITY TO USE, OR PERFORMANCE OF THE INFORMATION, SERVICES, PRODUCTS, AND MATERIALS AVAILABLE FROM THIS SITE. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.BECAUSE SOME JURISDICTIONS DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, OR THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU.