Privacy policy

INTRODUCTION

Faced with the development of new communication tools, it is necessary to pay particular attention to the protection of privacy. That is why we are committed to respecting the confidentiality of personal information provided through the forms on our website.

R2i has obtained ISO 27001 and 27018 certifications. The ISO/IEC 27000 standards impose guidelines for policies, encryption and procedures that safeguard information assets. This certification reflects R2i’s commitment to maintain the highest standards in data security and protection for our clients. It also speaks to the establishment of practices focused on ongoing improvement and a high level of security at the company.

USE OF COOKIES

Cookies are used to assist navigation on the pages of this website. They do not involve the collection of personal information on visitors. At any time, you can block cookies through your browser, although this may prevent you from using some features of the site.

If you are using a device in a public space or sharing a device with other users, make sure you delete all the information in the browser history before terminating your session.

AUTOMATIC INFORMATION COLLECTION

When you access this website, our server automatically collects the information needed to send files that are compatible with your device. The information collected is as follows:

  • your Internet service provider;
  • your IP address (the numerical address that precisely locates a device connected to the Internet, such as: 123.45.67.89);
  • your browser type (such as Firefox or Explorer) and operating system (such as Windows or Mac OS);
  • the pages you visit;
  • the date and time of access to each page;
  • the address of the referring site, if you access this website from another site.

Most of the information collected automatically does not reveal your identity. It is collected solely to meet the technological requirements of Internet communication.

PROCESSING OF PERSONAL INFORMATION

We keep the following information for a period of 7 years:

  • Full Name
  • Postal code
  • Email
  • Phone number
  • Title
  • Business name

The personal information we hold is voluntarily submitted through forms and through the interactivity established between you and our website. We also use, as described in the next section, cookies and / or logs to gather information about you.

FORMS AND INTERACTIVITY:

Your personal information is collected by means of a form, namely:

  • Making appointments
  • Contact
  • Document download
  • Newsletter subscription
  • Event registration

We use the collected information for the following purposes:

  • Making appointments
  • Contact
  • Communications

RIGHT OF OPPOSITION AND WITHDRAWAL

We are committed to offering you the right to remove your personal information from our database.

The right of opposition is understood as the possibility offered to Internet users to refuse that their personal information be used for certain purposes mentioned during the collection.

The right of withdrawal is understood as the possibility offered to Internet users to request that their personal information no longer appear, for example, in a mailing list.

To exercise these rights, you can:

Adresse : 7880 Grenache street, Anjou, QC, Canada H1J 1C3
E-mail : info@r2i.ca
Phone : 1 844 312-3007
Website : www.r2i.ca

PERMISSION TO ACCESS

We are committed to recognizing a right of access and rectification to data subjects wishing to consult, modify or delete information concerning them.

The exercise of this right will be done:

Adresse : 7880 Grenache street, Anjou, QC, Canada H1J 1C3
E-mail : info@r2i.ca
Phone : 1 844 312-3007
Website : www.r2i.ca

SECURITY

The personal information we collect is kept in a secure environment. People working for us are required to respect the confidentiality of your information.
To ensure the security of your personal information, we use the following measures:

  • SSL (Secure Sockets Layer) protocol
  • SET Protocol (Secure Electronic Transaction)
  • Access management – authorized person
  • Access management – person concerned
  • Network monitoring software
  • Computer backup
  • Development of digital certificate
  • Login password
  • Firewalls
  • Encryption
Contact