Public: 844-965-1386 (TX Flyer) 800-451-1954 (All others Flyer). ×

Privacy and Security Policy

Your privacy and the privacy of your clients is important to us.
Let us help you maintain privacy.


Crisis Cleanup, LLC ("Us," "We," or "Company") takes your privacy very seriously. This Privacy and Security Policy ("Policy") is designed to inform you, a user of our Service, about the types of information that we may gather or collect from or about you in connection with your use of the Service. It also explains the conditions under which we use and disclose that information.

Use of the Website and associated Services requires acceptance of this Policy. If you are not satisfied with any aspect of the policy, please discontinue using the Website and Service.

Changes to this Policy are discussed at the end of this document. Each time you use the Website, however, the current version of this Policy will apply. Accordingly, each time you use the Website you should check the date of this Policy (which appears at the end of this document) and review any changes since the last time you used the site.

1 Highlights & Principles

This entire Policy contains very important information. Please read all of it. Notwithstanding, here are some highlights and principles you may find of particular interest:

By design, Crisis Cleanup is an open system. This means by default all other participants in the Service can view all information entered into the system.

You are responsible for obtaining Client consent before entering information into the system. We (and other participants) may contact you with reports, questions, and other messages designed to assist running the System.

2 Definitions

The following words in this Privacy and Security Policy shall have the definitions below:

  1. Non-Personally-Identifying Information ("NPII"): Information that, without the aid of additional information, cannot be directly associated with a specific person.
  2. Personally-Identifying Information ("PII"): By contrast, PII is information such as a name or email address that, without more, can be directly associated with a specific person.
  3. You, or User: Has the same meaning as in the Terms and Conditions.
  4. Company ("Us," or "We"): Has the same meaning as in the Terms and Conditions.
  5. Service: Has the same meaning as in the Terms and Conditions.
  6. Website: Has the same meaning as in the Terms and Conditions.
  7. Your Materials: Has the same meaning as in the Terms and Conditions.

3 Children

The Website is not intended for children under 13 years of age. We do not knowingly collect personal information from children under 13. If you are under 13 years of age, you may not use this Service. Do not use the Service to store information about individuals under 13 years of age.

4 Information Collected

  1. Our goal is to help you understand not just what information we collect, but why and how we collect the information. The following table outlines what information we collect, how we collect it, and how we use it:
    Information Collected Primary Purpose Required? Shared with Other Participants? Shared with Public? PII or NPII
    Client Full Name, Address, Phone Number Empower disaster recovery organizations to help clients recover from disasters. Core to the proper functioning of the System. Required Shared with participating organizations Not publically shared PII
    Property Latitutde and Longitude Derived from the address. Core to the proper functioning of the System. Required Shared with participating organizations Not publically shared, except randomized to ~400 meters PII
    Client Prioritization Information A variety of questions designed to help work teams prioritize work orders, such as special needs. Optional Shared with participating organizations Not publically shared NPII
    Client Property Damage Information A variety of questions designed to assess damage and help work teams respond appropriately. Optional Shared with participating organizations Some shared publicly NPII
    Your Name & Contact Information Log changes to Clients' records; allow other participating organizations to contact you or your organization; facilitate transparent collaboration; contact you with information relevant or related to your service or use of Crisis Cleanup; ask for permission to share other types of information with you. Required Shared with participating organizations Not publically shared PII
    Usage Habits, Computer System Information We track non-identified usage information through third party analytics such as Google Analytics to understand how customers use the site, and for troubleshooting. This information may include search strings. You may block cookies from these websites without adversely affecting the Service. Some Optional if you disable third party cookies Not shared except in aggregate Not shared except in aggregate NPII
    Your Materials If you upload pictures or videos of disaster-affected areas, they may be shared publically. Optional Shared with participating organizations Shared publicly NPII

    Like most website operators, we gather NPII from visitors of the sort that web browsers, depending on their settings, may make available. That information includes the user's Internet Protocol (IP) address, operating system and browser type, the size of your computer screen, and whether your browser has enabled Javascript. We may also collect the locations of the web pages you view right before arriving at, while navigating, and immediately after leaving the Website. If you navigated to the Website from a search engine, the words you searched for (your "search string") may also be collected.

    We analyze this NPII gathered from users of the Website to help us better understand how the Website is being used. By identifying patterns and trends in usage, we are able to better design the Website to improve your experience. For example, analyzing the size of our users' screens helps ensure that we do not make our website too wide; analyzing search strings helps us improve content; and analyzing browser types helps us make our website accessible to the greatest number of users possible. Occasionally we may publish aggregated NPII, such as a report on trends in the usage of the Website.

  2. Web Cookies

    A "Web Cookie" is a string of information that a website stores on a user's computer, and that the user's browser provides to the website each time the user submits a query to the site. For example, Cookies enable users to visit multiple pages on the Website and log in only once. We use Web Cookies to track the pages that users visit during each Website session, both to help us improve your experience and to help us understand how the Website is being used. We do not attempt to link information gathered using Web Cookies to PII.

    This site uses cookies for some interactive features. Most browsers will automatically accept cookies. You can set your browser to reject cookies but some parts of the web site may not function properly if the cookies are rejected.

  3. Web Beacons

    A "Web Beacon" is an object that is embedded in a web page or email message that is usually invisible to the user (such as a small, invisible image), and allows website operators to check whether a user has viewed a particular web page or image. We may use Web Beacons on the Website to count users who have visited particular pages and to deliver co-branded services. Web Beacons are not used to access users' PII; they are a technique we may use to compile aggregated statistics about Website usage. Web Beacons collect only a limited set of information including a cookie number, time and date of a page view, and a description of the page on which the Web Beacon resides.

    Though you may not decline Web Beacons, they may be rendered ineffective by declining all cookies, changing your email client settings, modifying your browser setting to notify you each time a cookie is tendered and permit you to accept or decline cookies on an individual basis.

5 Other Disclosures

We will disclose Personally-Identifying Information under the following circumstances:

  1. By Law or to Protect Rights: We disclose PII and NPII when required to do so by law, or in response to a subpoena or court order, to cooperate with a legitimate law enforcement investigation, or when we believe in our sole discretion that disclosure is reasonably necessary to protect our property or rights, or those of third parties or the public at large.
  2. Business Transfers; Bankruptcy: We reserve the right to transfer all PII and NPII in our possession to a successor organization in the event of a merger, acquisition, bankruptcy, or other sale of all or a portion of our assets. Other than to the extent ordered by a bankruptcy or other court, the use and disclosure of all transferred PII will be subject to this Policy, or to a new privacy policy if you are given notice of that new privacy policy and are given an opportunity to affirmatively opt-out of it. PII submitted or collected after a transfer, however, may be subject to a new privacy policy by the successor organization.
  3. Research or Historical Purposes: Crisis Cleanup information may be useful to improve future response and coordination efforts, or to ensure a correct historical narrative is preserved. We may partner and share information with recognized research institutions or organizations. However, we will only do so if the research project has been approved by an institutional review board or privacy board that has established protocols to ensure the privacy of the information shared. We may also, upon request and at our sole discretion, share a reasonable amount of information with community or national historical preservation organizations in a manner reasonably designed to protect the identities of survivors, and after a reasonable time has passed from the disaster.
  4. Other Purposes: As otherwise described in this Policy.

6 SSL Encryption

The transfer of online transaction data to and from the web site is protected by the implementation of a Secure Sockets Layer (SSL) protocol. Our security certificate allows web browsers to verify the authenticity of the secure sections of the Website and to communicate with our site securely, encrypting confidential information as it passes over the internet. It is your responsibility to keep your password secure at all times to avoid unauthorized use of your account.

7 Policy Changes

  1. Changes: We may, at our sole discretion, change this Policy from time to time. Any and all changes to our Policy will also be reflected on this page. Unless we obtain your express consent, any revised Policy will apply only to information collected after such time as the revised Policy takes effect, and not to information collected under any earlier Privacy Policies. We will attempt to notify you whenever there are material changes to this Policy. We encourage you to frequently check this page for any changes to our Policy. If you have any questions about our Policy, please contact us.
  2. Effective Date: This Policy is effective July 28, 2013. Last Updated: March 17, 2016.