The Power of Right Decision
home | search | sitemap | help
  Home About  Us Solutions Services Partners Contact  

Privacy policy

You can be sure your privacy will be respected on our site, because does not share your details with third parties and will not contact you without your permission. is dedicated to safeguarding the privacy of site visitors, and our privacy policy is very simple. will not share individual information about you with any third party, and will not contact you without your permission. This commitment to confidentiality will be restricted or suspended only under direct legal requirement, and then only to the extent necessary to comply with the rule of law.

How We Use Information You Provide

Contact information which you provide when subscribing to our services, and data which you provide in connection with your use of specific service, will be used only in connection with the normal operation of the related site services. All services will include links to enable you to update your information and preferences.

Site visitors and subscription users  providing personal details to this website will not be contacted by us unless they have explicitly given their permission that we may do so, or unless they have implicitly given their permission by writing to us with feedback, suggestions, questions or comments. (Note that we may operate automatic reply systems -- such as out-of-office notifies, anti-spam verification systems, and the like -- which result in replies automatically being sent in response to certain email messages.) Except in the unlikely event that we are required to do so due to legal considerations, personal details will never be shared with any third party without permission.

Site users providing information to the explicitly grant permission for that information to be saved on their secured area on our servers.

Data Security

Information transmitted across the Internet relies on an international standard called the Internet Protocol (or 'IP') in order to arrive at its destination. This standard requires each machine transmitting information to have a unique address called an IP address. This allows a packet of information to be routed to the correct machine much like a street address and postcode allow a letter to be delivered to the correct house. IP addresses are usually assigned dynamically by an individual user's Internet Service Provider at the time they connect to the internet, and IP addresses of visitors are automatically logged by web hosting providers. Often other technical details, such as a visitor's operating system and browser type are also logged by web hosting providers. (Note that all this applies to the Internet as a whole, not just to individual sites.) reviews these records collected by our web server for statistical purposes. However, individual users are not identified by these data.

At any user or visitor information stored locally (including all emails, once they have been received) is kept on a highly secure server and protected with SSL technology provided by GeoTrust. Sites secured by GeoTrust SSL certificates are providing up to 256 bit encryption thereby offering the highest level of encryption and security possible. This means you can rest assured that communications between your browser and Virtual Psychology web servers are private and secure.

Privacy at the User End

Site visitors should be aware of a number of factors which could impact privacy from their end of the network and which are therefore beyond the control of Roughly, these factors fall into two categories. First are those which result from sharing a computer with another user. For example, the default behavior of modern browsers typically keeps a history of the most recently visited sites. If this feature is not switched off or adjusted to keep a very minimal history, another user could identify many of the most recently visited sites by inspecting this log. Similarly, another user might access email records kept on a shared computer, in some cases even if those two users login to a shared machine with different usernames.

The second category of factors which can impact user privacy are those which result from visiting via an employer-operated network. Many employers log traffic to and from their networks, and virtually all large employers keep records of employee emails which pass through their servers. In the latter case, this means that copies of emails may be kept even after they have been deleted from an individual user's machine.


 Psytec Corporation

Home | About us | Solution | Services | Partners | Contact
Copyright 2003-2016 Psytec Corporation. All rights reserved.