This policy covers personal information (PI) data derived from visits to DCL Logistics (DCL) website located at https://dclcorp.com/
DCL complies with California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) regulations regarding the collection, use, and retention of website visitor personal information.
DCL is a 3rd party logistics Service Provider that receives, warehouses, and fulfills consigned consumer products for the purpose of completing a purchase transaction between the product seller (Covered Business) and a product buyer (Consumer). A master services agreement or contract covers DCL’s service relationship with the Covered Business.
Data Collection and Usage
We collect personal information on our website through any fillable forms, including but not limited to, Contact Use and Request Pricing forms. This information is only used for the stated purpose. Personal information is not shared with any person or entity outside of DCL for any purpose other than as stated.
DCL may record and collect personal information related to a visitor’s website usage. This data tracking may include a visitor’s domain name, type of browser and operating system, Internet Service Provider (ISP), Internet protocol (IP) address, language, prior website visit, visit duration (time spend and pages visited on website). DCL uses these data points in aggregate form to measure the website activity and improve its design and functionality. DCL may employ 3rd party data consolidators to provide DCL with aggregate marketing or industry profiling data for the purpose of targeting or sending direct advertising of DCL’s services.
DCL never sells or offers to sell, exchange, or trade any PI data or aggregation of PI data for the purpose of profit or influence.
Website derived personal information data is maintained by DCL’s Data Controller.
DCL’s database and cloud-based servers are firewall protected from outside intrusion. DCL’s IT Group maintains and updates data security and software program, including performing periodic penetration tests to confirm server protection integrity. IT also maintains systems access and user permissions.
Violation of Policy