Name Change Alabama - Privacy Policy
Our Name Change Alabama service values your privacy and has a dedicated privacy policy to safeguard it. At Name Change Alabama, we are committed to protecting your personal information and ensuring that it is not shared with third parties or sold. This is the central tenet of our privacy policy.
We hold the utmost respect for your privacy. We do not disclose, lease, sell, or distribute personal information to any third parties. The only information we gather is through indirect means, such as cookies, analytics programs, or web server logs.
Service Requirements and Privacy
To utilize our services, we will require your email address. However, rest assured that we will solely use it to send you emails pertinent to your account and updates regarding our website. If you wish to unsubscribe from these messages, kindly email us at info@namechangealabama.com with "unsubscribe" in the subject line, and we will promptly remove you from our email list.
Financial Information:
We are using third-party payment gateways such as Paypal.com, Authorize.net, or Stripe. Therefore, we never store your financial information.
Personal Information:
At Name Change Alabama, we prioritize the protection of your personal information. Only customers with their individual passwords can access their private information. Moreover, we employ advanced technology to encrypt your data before transmitting it from your browser to our web server.
Please note that this privacy policy, along with the terms of service, solely applies to your experience on this website. When visiting other websites, it is essential to review and agree to the terms and privacy policies of our affiliates and advertising partners.
Name Change Alabama is committed to maintaining the integrity and confidentiality of information and systems by continuously evolving our practices.
We utilize state-of-the-art security measures to protect our networks and websites from any potential misuse, alteration, copying, disclosure, destruction, monitoring, unauthorized sharing of information, or damage. To ensure protection, we utilize security software and encryption protocols. Our security measures encompass physical, technical, and procedural controls that work in tandem to safeguard the information provided by our users.