The Next Step In School Safety

1-800-327-0322

Summit Industries Corporation's Policies

SUMMIT INDUSTRIES CORPORATION is a Florida Corporation, hereinafter known as "SIC". SIC is committed to protecting the privacy of our customers' data. A customer collectively refers to school districts, individual schools, students attending schools, employees, volunteers, parent/guardians, vendors or visitors of any district and/or school that use SIC's products or services.


1. Commitment to Customer Data Privacy

SIC is committed to safeguarding our customers' data by adhering to relevant data privacy laws and regulations as well as contractual commitments to our customers.

2. This Policy Applies to SIC Customers

This policy applies to the services and products offered by SIC and binds all our employees. This policy refers to customer data. We may refer to this group of individuals as "you," or "Customers."

3. What Information Is Collected And How Is It Collected?

SIC collects customer data about you when you purchase, use, or benefit from SIC's services or products.

"Data" includes information that will allow someone to identify or contact you, including, for example, your full name, address, telephone number or email address.

Data also includes aggregated data or data that, by itself, does not permit the identification of individual persons such as statistics on the number of people visiting the SIC website each month.

You provide certain data to SIC when, for example, you: (a) call our technical support; (b) contact us to receive security consultancy and security services; (c) order services and products from SIC websites; (d) submit forms through our web sites; (e) access services through a downloadable electronic application for mobile devices ("App"); or (f) make inquiries, requests or complaints.

Subject to your agreement to the applicable terms and conditions, you may access services through the SIC application, including security information and other services, which may be added by SIC from time to time.

The SIC application provides information, including your or your organization's SIC Customer Number, as well as the email address of your mobile device. To enable location-specific services, the App also collects and divulges your location. The App also periodically provides information concerning your usage of particular SIC's application features.

When you choose to pay for SIC services or products by credit card directly from the SIC website, you will be required to provide the name on the credit card, credit card number, expiration date and other security information. When you choose to pay for SIC services or products by other means, we may ask you for your credit card details, contact details, and bank account details, if needed.

You also provide information to us when you choose to email data to us or if you choose to you participate in marketing and sales initiatives. SIC will only gather data that is relevant for the purposes for which it will be used and will not gather excessive or unnecessary data. SIC shall take reasonable steps to ensure that data is reliable, accurate, complete, and current, bearing in mind its intended use. You have a responsibility to keep the data you provide to us updated, and we will take reasonable steps to facilitate this.

4. Data Access & Maintenance

SIC provides data access to only active and paid subscription customers. Customers can only access data for their district and/or school. The customer's data is available and active through an SSL secure web login process with secret passwords.

5. Service Backups

On servers hosted by SIC and used by the Customer, SIC has responsibility to maintain the Customer's data, including data backups. Full backups are done daily. Data "snapshots" are done throughout the day.

Customers are responsible for a) keeping all passwords secret; b) all data management and data security held on the Customer supplied computers used at the schools. It is Customer's responsibility for all updates, upgrades, anti-virus security, windows updates/patches, network connections, and Internet access connections. Customer agrees to provide SIC with remote access to the Customer check in/out computers (Client), if needed for support.

6. Termination Of Services

Should SIC terminate Customer services and/or the Customer terminates services with SIC, then the Customer will no longer be able to log in and create and/or run any reports or view data, delete data or edit data.

Data will be held in the SIC active database for 90 to 180 days after termination of services. Once SIC removes the Customer's data from the SIC active database, the Customer's data will be moved to an off-line inactive database and held for two (2) years. After two (2) years, Customer's data will be archived to a zip password protected storage.

If after termination of services, a Customer has a need to access Customer's data, then Customer can submit a written request for such access. Customer's request must provide specific details regarding the data requested. Districts and/or Schools will be charged a reasonable expired data access fee. The expired data access fee must be paid prior to release of any data.

7. Access / Sale / Share Of Customer Data

SIC will not:

  • Allow access to Customer data by any third party.
  • Sell and/or trade Customer data to any third party.
  • Share Customer data with any third party.

8. Acceptance and Links to other Websites

This SIC website may contain links to other websites, which are provided solely as a convenience to you and not as an endorsement by SIC to other web sites' content. The other web sites may have their own policies, which SIC does not control, and thus are not addressed or controlled by SIC.

9. Cookies

A cookie is a piece of data stored on your hard drive containing information about you. SIC uses cookies in order to identify a user session, but usage of a cookie is in no way linked to any personally identifiable information while on SIC's websites. SIC also uses ‘analytical cookies'. These allow us to recognize and count the number of visitors logging into our web site and to see how visitors move around the site when they are using it. This helps us make sure sites are meeting users' needs and to find out how we can improve. The analytical cookies do not capture any personally identifiable information. Most browsers are initially set up to accept cookies. Though most cookies expire after a certain period of time, you can choose to delete a cookie file at any time. You can do so by resetting your browser to refuse all cookies or to indicate to you when a cookie is sent. However, some SIC features or services may not function properly without cookies. This privacy statement covers the use of cookies by the SIC site only and does not cover the use of cookies by anyone else.

10. How Data Will Be Used

SIC uses the Customer's data to primarily track when people (adults and students) check in and/or check out at a school. This is done to enhance Customer's school security.

SIC will use the Customer's data to provide you with services and products that: (a) you purchase; (b) are purchased by your employer; (c) are purchased by an association or institution (including an educational institution) of which you are an employee or a member.

The data collected enables SIC to provide better and more relevant Customer services. Location information collected is used to provide security alerts and other security information.

11. Student Data Privacy

SIC only collects information on students who are students in the district/school and only with the permission of the Customer.

12. How Customers Can Correct Inaccuracies in The Data?

You can review Customer data by logging into www.schoolcheckin.net with your user name and password to access your data. Customers can add, edit and/or delete their data.

13. SIC's Security Procedures Used To Protect Customer's Data

SIC takes precautions to protect its Customer's information. SIC has implemented policies that forbid its employees from using or disclosing Customer data in an inappropriate or unlawful manner. SIC maintains security measures to safeguard Customer data from unauthorized access, misuse, alteration, loss or destruction.

Information Collected By Electronic Means

When Customer provides SIC with data through online forms and other electronic methods, the data is protected using industry-standard encryption.

All SIC employees are required to follow this Data Privacy Policy. Our Data Privacy Policy is periodically reviewed and updated because the information security landscape is in a constant state of flux. All employees are required to sign an employee confidentiality agreement.

Security of Premises and Other Physical Security Measures

Physical access to all SIC offices and server hosting offices are security controlled, which include locks that are opened by keys and/or by using security cards and/or security card readers that record the identity of employees and visitors entering or leaving the facilities.

Information systems containing sensitive information and communications equipment are placed in secure areas and protected by additional physical security measures that permit access only to the employees who need access, operational processes, environmental controls and fire detection and suppression systems to safeguard against accidental loss, theft or unauthorized removal, misuse, damage or unauthorized access.

Security Against Unauthorized Electronic Access and Viruses

  • All gateways to the Internet are firewall protected, and access to both internal and external networks are restricted and controlled.
  • All servers are hardened based on security hardening standards to protect against network threats.
  • Endpoint security is constantly being review to protect the network against unauthorized access, data loss or destruction.
  • Access to computer services and information is on a roles and responsibility basis and is restricted and controlled based on business requirements to reduce the risks associated with misuse, such as alteration, destruction and unauthorized dissemination of data.
  • Access to information services is through a secure login process with a unique identifier.
  • User access to our management system and essential network services are controlled using a user rights management system that utilizes employees' roles in assigning user access rights, especially to the case management system.
  • All remote access is given on a needs basis and is via a two-factor authentication mechanism.
  • Mobile devices have password policy controls, and remote device hardware reset features enabled to protect against lost or stolen devices.
  • Before being approved, changes to production systems and network follow a change management process flow to ensure that changes are assessed for risk and operational impacts.
  • Critical servers are scanned using network and system vulnerability scanners.
  • Web applications are also scanned by automated penetration tools for application level security vulnerabilities that may be susceptible to hacking.
  • External vulnerability scanning on our Internet facing sites are performed to ensure that these sites are secure. This is done using in-house vulnerability scanning tools and third-party services.
  • Penetration tests are also performed on our key Internet applications prior to production or major upgrades.
  • SIC engages external consultants to conduct security review of our environment. These reviews help us to understand the security gaps and ensure that our infrastructure and applications are able to meet and mitigate new network and Internet security threats and risks.

SIC endeavors to ensure that the content contained on this site is suitable for both children and adults. In the event you discover any content that you feel might be inappropriate, please contact us immediately, so that we may consider immediate corrective action.

SIC makes every effort to ensure that any third-party links meet and/or exceed our stated web promise.

Currently, the products and programs offered are only available in the United States of America. All prices are in U.S. currency, and all monies owed and payable are only payable in U.S. currency or U.S. funds.

PLEASE READ THE FOLLOWING TERMS OF USE AND DISCLAIMER CAREFULLY BEFORE USING THIS WEB SITE
(this "SITE").

By using this site, you agree to these terms of use. If you do not agree to these terms, you may not use this site.

SIC reserves the right at any time to modify, alter, or update these Terms of Use, and you agree to be bound by such modifications, alterations, or updates.

Copyright:

All site design, text, graphics, interfaces, and the selection and arrangements thereof are copyrighted and subject to those laws and regulations.

Trademarks:

All trademarks, service marks, and trade names (collectively the "Marks") are proprietary and subject to those law and regulations.

Disclaimer:

THE INFORMATION, SERVICES, PRODUCTS, AND MATERIALS CONTAINED IN THIS SITE, INCLUDING, WITHOUT LIMITATION, TEXT, GRAPHICS, AND LINKS, ARE PROVIDED ON AN "AS IS" BASIS WITHOUT ANY WARRANTY. TO THE MAXIMUM EXTENT PERMITTED BY LAW, SIC DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO SUCH INFORMATION, SERVICES, PRODUCTS, AND MATERIALS, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON INFRINGEMENT, FREEDOM FROM COMPUTER VIRUS, AND IMPLIED WARRANTIES ARISING FROM COURSE OF DEALING OR COURSE OF PERFORMANCE. IN ADDITION, SIC DOES NOT REPRESENT OR WARRANT THAT THE INFORMATION ACCESSIBLE VIA THIS SITE IS ACCURATE, COMPLETE OR CURRENT. Price and availability information is subject to change without notice.

Limitation on Liability:

IN NO EVENT SHALL SIC BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER, EVEN IF SIC HAS BEEN PREVIOUSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, WHETHER IN AN ACTION UNDER CONTRACT, NEGLIGENCE, OR ANY OTHER THEORY, ARISING OUT OF OR IN CONNECTION WITH THE USE, INABILITY TO USE, OR PERFORMANCE OF THE INFORMATION, SERVICES, PRODUCTS, AND MATERIALS AVAILABLE FROM THIS SITE. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY. BECAUSE SOME JURISDICTIONS DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, OR THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU.

SIC data breach policy is in accordance with Fla. Stat. 501.171. All definitions for this policy are as defined under this statute. SIC shall take reasonable measures to protect and secure data in electronic form containing personal information.

1. A police report, incident report, or computer forensics report.
2. A copy of the policies in place regarding breaches.
3. Steps that have been taken to rectify the breach.

Summit may provide the department with supplemental information regarding a breach at any time.

Summit shall give notice to each individual in this state whose personal information was, or Summit reasonably believes to have been, accessed as a result of the breach. Notice to individuals shall be made as expeditiously as practicable and without unreasonable delay, taking into account the time necessary to allow Summit to determine the scope of the breach of security, to identify individuals affected by the breach, and to restore the reasonable integrity of the data system that was breached, but no later than 30 days after the determination of a breach or reason to believe a breach occurred unless subject to a authorized delay or waiver.

If a federal, state, or local law enforcement agency determines that notice to individuals required herein would interfere with a criminal investigation, the notice shall be delayed upon the written request of the law enforcement agency for a specified period that the law enforcement agency determines is reasonably necessary. A law enforcement agency may, by a subsequent written request, revoke such delay as of a specified date or extend the period set forth in the original request if further delay is necessary.

Notice to the affected individual is not required if, after an appropriate investigation and consultation with relevant federal, state, or local law enforcement agencies, Summit reasonably determines that the breach has not and will not likely result in identity theft or any other financial harm to the individuals whose personal information has been accessed. Such a determination shall be documented in writing and maintained for at least 5 years. Summit shall provide the written determination to the department within 30 days after the determination.

The notice to an affected individual shall be by either a written notice sent to the mailing address of the individual in Summit's records or by email sent to the individual's email address in Summit's records.

The notice to an individual with respect to a breach of security shall include, at a minimum the date, estimated date, or estimated date range of the breach of security, a description of the personal information that was accessed or reasonably believed to have been accessed as a part of the breach of security, and information that the individual can use to contact Summit to inquire about the breach of security and the personal information that Summit maintained about the individual.

Summit may provide substitute notice in lieu of direct notice if such direct notice is not feasible because the cost of providing notice would exceed $250,000, because the affected individuals exceed 500,000 persons, or because the covered entity does not have an email address or mailing address for the affected individuals. Such substitute notice shall include a conspicuous notice on Summit's website and notice in print and to broadcast media, including major media in urban and rural areas where the affected individuals reside.

Notice provided pursuant to rules, regulations, procedures, or guidelines established by Summit's primary or functional federal regulator is deemed to be in compliance with the notice requirement if Summit notifies affected individuals in accordance with the rules, regulations, procedures, or guidelines established by the primary or functional federal regulator in the event of a breach of security. Summit is deemed to be in compliance with notice requirements if it timely provides a copy of such notice to the department.

If Summit discovers circumstances requiring notice to more than 1,000 individuals at a single time, Summit shall also notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis as defined in the Fair Credit Reporting Act, 15 U.S.C. s. 1681a(p), of the timing, distribution, and content of the notices.

There is no private cause of action pursuant to this policy. There are no additional requirements imposed under this data breach policy upon Summit than those recited in Fla. Stat. 501.171.

Prior to returning, the customer must contact SIC to obtain a return merchandise authorization (RMA) for all returned items.

Items need to be returned within 30 days from receipt of all items purchased and in a like-new condition. Items that are damaged, unsanitary, dented or scratched may be denied a return.

Please return items with all accessories and packaging. If you do not, we may either deny the return or allow a return with a nonrefundable deduction on your refund for what is missing. Any returned items must be returned repackaged properly in its original box with all the original materials, including cords, adapters, and documentation, that were included when it was received. The original packaging should then be put inside another package or box for protection.

All opened, returned items will have to be inspected and tested before a credit can be issued.

A 15% restocking fee will be applied to all returned items that can be resold as returned. If the items cannot be resold, a higher restocking fee may be charged based on the product's condition.

Shipping, set-up fees, training fees, and data integration fees are nonrefundable once services are rendered.

On the SCI one-year software license subscriptions, only the unused months are refundable. Unused months are calculated based on when the license period began and when the customer requested the refund.

With a few exceptions, we will reimburse you for returned items in the same way you paid for them. If you prefer, you can make an exchange for the same item.

Help at the push of a button.Take the next step in school safety.