Skip to main content
compareusvsca
Accredited Programs
Industry Certified
Eco-Focused Training

How We Handle Your Information

Last updated: January 2025

Our Approach to Your Details

We're compareusvsca, operating out of Brooklyn at 134 N 4th St f2, helping people build careers in eco-tourism and sustainable travel. When you interact with compareusvsca.it.com, certain pieces of information naturally move through our systems. This document explains what happens to those details, why they're needed, and what control you retain over them.

Instead of walking through the typical collection-use-sharing sequence, we're organizing this around actual user experiences. What happens when you sign up? When you reach out for support? When you browse programs? Each interaction creates a different information footprint, and understanding those patterns matters more than abstract policy statements.

Our core principle: gather only what serves a clear operational purpose. If we can deliver value without capturing a particular detail, we skip it. Every data point we ask for needs to justify its existence through actual utility, not through "might be useful someday" logic.

01

What Information Enters Our Systems

And the specific moments when intake occurs

Different touchpoints generate different information types. When someone registers for a career development program, we receive their full name, email address, phone number, and their stated interest area within sustainable travel. That's the baseline. But the intake doesn't stop there.

Program participants often submit career history documents, educational background summaries, and specific learning objectives. These arrive through our learning platform when people complete their initial assessment or enrollment forms. The content varies wildly depending on where someone stands in their career transition journey.

Identity Elements

Name, email address, phone number, general geographic location. Derived from account creation, enrollment forms, and support requests.

Career Context

Work history summaries, educational credentials, skill assessments, career transition goals. Submitted during program application and ongoing learning activities.

Interaction Records

Support ticket content, program feedback, communication exchanges with instructors or career advisors. Generated through active engagement with our services.

Technical Footprints

Device type, browser information, IP address, pages visited on our site. Automatically captured through normal website operation. For specifics on tracking mechanisms, see our Cookie Policy.

Payment Details

Billing address, payment method identifiers. We don't store full card numbers—our payment processor handles that security burden.

Program Progress

Module completion status, assignment submissions, quiz results, certification achievements. Recorded as participants move through learning materials.

Everything listed above arrives because someone took a deliberate action—signed up, submitted a form, contacted support, enrolled in a program. We don't purchase data from third-party aggregators or merge in information from external databases. The only exception: payment processors send us transaction confirmation details, but those contain minimal information beyond "payment succeeded" or "payment failed" plus a transaction identifier.

One area worth highlighting: when prospective students browse our site before enrolling, we capture technical visit data. Browser type, which pages they viewed, how long they stayed, what device they used. This happens automatically through standard website infrastructure. The Cookie Policy explains those mechanisms in detail, but the short version is that pre-enrollment browsing creates a technical record even before someone becomes a registered user.

02

Why These Details Matter to Us

Operational necessities and service delivery requirements

Every piece of information we capture serves a functional purpose. There's no "just in case" collection happening. Let's break down the operational logic category by category.

A

Account Infrastructure

Your name and email address form the core identity markers that let us maintain your account. When you log in, we verify those credentials. When we send program updates or important notices, we route them to that email. Phone numbers become critical when urgent issues arise or when career advisors need to schedule consultations. Without these basics, the service infrastructure collapses.

B

Personalized Learning Paths

Career history and skill assessments determine which program modules make sense for each participant. Someone transitioning from hospitality management needs different foundational content than someone coming from environmental science. Those intake forms directly shape curriculum sequencing and advisor recommendations.

C

Support and Problem Resolution

When technical issues emerge or questions arise, support tickets create a record of the conversation. That history prevents repetitive explanations and helps our team track recurring problems. Communication records also protect both parties—there's documentation of what was requested and what solution was provided.

D

Financial Processing

Payment details facilitate enrollment transactions. Billing addresses help prevent fraud. Transaction records prove that payment occurred and enrollment was properly activated. These details also support refund processing when circumstances warrant it.

E

Platform Improvement

Technical visit data reveals which pages cause confusion, where people drop off, which content formats work better. Aggregated progress metrics show which modules need revision or where additional support resources would help. This isn't about tracking individuals—it's about identifying systemic patterns that inform platform development.

F

Legal Compliance and Safety

Certain records exist purely because regulations require them. Transaction documentation must be retained for tax purposes. Communication records may be needed if disputes arise. Geographic information helps ensure we're meeting location-specific requirements around educational services.

Here's what we explicitly don't do: sell participant information to third parties, use your details for unrelated marketing campaigns, or share career histories with potential employers without explicit permission. The boundaries are clear—information serves program delivery and operational necessity, nothing beyond that scope.

03

Movement Beyond Our Systems

When and why information travels to external parties

Most information stays within our operational infrastructure, but certain functions require external service providers. Understanding those handoffs matters because your details briefly pass through systems we don't directly control.

Payment processing represents the clearest example. When you enroll in a program, billing details move to our payment processor. They handle the actual transaction—card verification, fraud checks, fund transfers. We receive confirmation that payment succeeded or failed, but the processor retains the sensitive payment credentials. That separation is intentional and security-driven.

Email delivery services receive your email address and the content of messages we send. Program updates, enrollment confirmations, support responses—those all flow through a third-party email infrastructure. We compose the messages, but the actual delivery mechanism sits outside our servers. Those providers operate under strict data handling agreements that limit how they can use participant information.

Technical Infrastructure Providers

Hosting services, content delivery networks, database management systems. These entities provide the foundational technology that keeps compareusvsca.it.com operational. They have access to stored information purely for technical maintenance purposes.

Bound by data processing agreements that prohibit independent use

Communication Tools

Email services, messaging platforms, video conferencing systems used for career advising sessions. Your details pass through these systems during active communication but aren't retained afterward beyond standard operational logs.

Operate under vendor agreements with data protection requirements

Legal Obligations

If legally required through valid court orders, subpoenas, or regulatory demands, we may need to disclose participant information to government authorities. This happens rarely and only when legally compelled.

Disclosure occurs only when legal requirements mandate it

One scenario we want to address directly: if compareusvsca were acquired by another organization or merged with a different educational provider, participant information would transfer to the new entity. That's a business reality—the new owner would need access to student records, enrollment details, and operational data to maintain service continuity. In such circumstances, affected participants would receive advance notice about the transition and any changes to information handling practices.

We don't engage in data brokerage, don't sell mailing lists to other educational institutions, and don't provide participant details to marketing aggregators. The external movement described above represents the complete picture—anything beyond those specific categories requires your explicit authorization first.

04

Protection Measures and Remaining Risks

Security approach and honest limitations

Technical safeguards exist across multiple layers. Data transmission between your browser and our servers occurs through encrypted connections. Stored information sits behind authentication barriers that require valid credentials for access. Payment details never touch our systems directly—they move straight to payment processors with specialized security infrastructure.

Internal access follows role-based restrictions. Support staff see only what they need to resolve issues. Career advisors access learning records relevant to their assigned participants. System administrators have broader access for technical maintenance, but activity logs track who viewed what information and when. These controls aren't perfect, but they reduce unnecessary exposure.

Regular security assessments happen, though the frequency and scope vary based on resource availability and evolving threat landscapes. We patch known vulnerabilities, monitor for suspicious activity, and maintain backup systems in case primary infrastructure fails. But here's the reality: no system is completely breach-proof. Sophisticated attacks sometimes succeed despite reasonable precautions.

If a security incident occurs that compromises participant information, affected individuals receive direct notification. The timeline depends on the investigation complexity—sometimes we know immediately, sometimes it takes days to understand the full scope. Transparency about breaches isn't optional; it's both an ethical obligation and a legal requirement in most jurisdictions.

Information retention follows operational necessity. Active participant records remain accessible throughout program enrollment and for a reasonable period afterward to support transcript requests or alumni services. Once that operational window closes, records move to archive status with more restricted access. Eventually, details that no longer serve any legitimate purpose get permanently deleted.

Financial records follow different retention rules because tax regulations require multi-year documentation. Those timelines aren't our choice—they're dictated by legal requirements that apply to educational service providers. Similarly, certain compliance-related records must be kept for specified durations regardless of whether ongoing operational need exists.

05

Your Control Over Information

Access, modification, and removal options

You can request to view what information we hold about you. That includes account details, learning progress records, support ticket history, and enrollment documentation. Some technical logs may be excluded because they contain mixed data from multiple users that can't be easily separated, but the core personally identifiable details are accessible.

Corrections happen when information is inaccurate. If your email address changed, name was misspelled, or career history details need updating, those modifications can be made through your account settings or by contacting support. Some records, like completed transaction details, can't be altered after the fact because they serve as historical documentation of what occurred.

Data Portability

Request a copy of your information in a structured, commonly used format. This lets you transfer details to another service provider if you choose to move your career development efforts elsewhere.

Contact us at [email protected] to initiate export

Processing Restrictions

Object to certain uses of your information, particularly for purposes beyond core service delivery. Marketing communications can be declined. Some processing tied to essential functions can't be stopped while maintaining active enrollment.

Specify which processing activities you want limited

Complete Deletion

Request removal of your information from our systems. This typically requires account closure and program withdrawal. Some details must be retained for legal compliance even after deletion requests, but those exceptions are narrow and documented.

Send deletion requests to [email protected] with account details

Response timelines for these requests vary. Simple access requests usually get fulfilled within a week. Complex data export requests involving large learning histories might take two to three weeks. Deletion requests that require legal review can extend to thirty days. We'll acknowledge receipt promptly and provide status updates if processing takes longer than initially estimated.

Certain requests can't be accommodated if they conflict with legal obligations or would undermine essential service functions. If your employer sponsored your enrollment and payment came through corporate channels, we may need to retain some transaction documentation even if you request deletion. Active legal disputes or regulatory investigations might freeze information until those matters resolve. These limitations are narrow but real.

Questions and Concerns

This document covers the fundamental aspects of how we handle participant information, but it can't address every possible scenario or nuanced question. If something remains unclear or if you need to exercise any of the rights described above, direct contact is the most effective approach.

Mail

compareusvsca
134 N 4th St f2
Brooklyn, NY 11249
United States

Policy updates happen periodically as our services evolve or legal requirements change. Material modifications that affect how we handle information will be communicated directly to active participants via email. The effective date at the top of this document reflects the most recent revision. Continued use of our services after updates indicates acceptance of the modified terms.