Before using the Skynet tech solutions Service, the customer must first complete the registration form. This involves giving user contact information such as First and Last name, E-mail address, Postal address, etc. Skynet tech solutions will use your contact details to contact you regarding the product and/or services you have requested. This consists of renewal/re-registration notifications, special offers, and surveys on improving our service.
If user purchases a plan by Skynet tech solutions, we will collect credit card information, and other payment information necessary to complete a payment from user. Skynet tech solutions may use a third party to process and verify credit cards for billing purposes. This entails we share user name, credit card number, expiration date and billing address with the credit card processing company. When processing a payment transaction, Skynet tech solutions will also obtain information regarding the amount of the payment and other transaction data. We may transfer or disclose this payment information to a third party only to the extent necessary in order to complete the payment processing.
Computer System Information Subscriber Computer
We may also seek information related to your computer. This may include: information about the make and model of your computer and/or any computer hardware, software or peripherals attached to it, date of purchase and type of computer, identification number of your computer, condition of the computer and the application if reporting a fault occurrence and during diagnostics, system and registry data about software installations and hardware configurations, and error tracking files. Generally, this information is required to offer personalized technical support to you, and to help us update our support tools and augment our supported products list.
While requesting support you may request for the problem to be resolved by taking control of your computer. Skynet tech solutions uses qualified utilities which allow user to grant control of user computer to an Expert remotely over the Internet, so that the Expert can diagnose or correct problems. Experts are not allowed to use the Remote Access software until and unless they have received adequate training in its use, and user have consented to grant control. Furthermore, Experts will not use Remote Access tools to collect sensitive or confidential information stored on user computer or network, deliberately destroy information on user computer or network, or cause user to experience system problems.
Notification of Changes