When you engage in certain activities on this site, such as researching or registering products, or downloading software, you will be asked to provide certain information about yourself, such as your first and last name, mailing address (including zip code), e-mail address, employer, job title and department, telephone and facsimile numbers, and other personal identifying information. Depending upon the activity, some of the information that we ask you to provide is identified as mandatory and some as voluntary. lf you do not provide the mandatory data with respect to a particular activity, you will not be able to engage in that activity.
OSM's use of your personal information depends on the activities in which you choose to participate. lf you have ordered a product, for example, the information is used to register your license and rights, if any, to technical support, or other benefits that may be made available to registered users. The information that you provide is also used as part of our effort to keep you informed about product upgrades, special offers, and other products and services of OSM.
The personal information that you provide in connection with registering yourself as an OSM user or registering an OSM product is classified as Registration Information which may be accessed only by you through a password and a unique customer lD. This password is encrypted. In addition, your Registration Information resides on a secure server that only selected OSM personnel and contractors have access to via password. OSM encrypts your personal information and thereby prevents unauthorized parties from viewing such information when it is transmitted to OSM. We employ industry recognized security safeguards to help protect the personally identifiable information that you have provided to us from loss, misuse and unauthorized alteration. Whenever we prompt you to transmit sensitive information, we support the encryption of your data as it is transmitted to us. We work to protect personally identifiable information stored on the site's servers from unauthorized access using industry standard computer security products, such as firewalls, as well as carefully developed security procedures and practices. All employees must review and sign a written statement of these practices, which include limiting access to sensitive information only to those employees who require the information and enforcing strict password protocols for all employees. We use both internal and external resources to review the adequacy of our security measures on a regular basis.