Privacy Statement

We collect personal information from our visitors on a voluntary basis. Personal information may include name, title, company, address, phone number, email address, and other relevant data. Questions or comments submitted by visitors may also include personal information.

We use the information that visitors provide for such purposes as processing and responding to requests, improving our operations, and communicating with visitors about our products, services and businesses. But we do not sell or rent personal information to unrelated businesses for direct marketing purposes. Also, as our business evolves, we may transfer or acquire businesses and related assets, and we may transfer information about customers and site visitors in connection with such transactions.

Our web server also automatically collects non-personally-identifiable information such as the domain name of the site providing the visitor with Internet access, but not the visitor’s user name. Other examples of information collected by our server include the Internet protocol (IP) address used to connect the visitor’s computer to the Internet, the visitor’s browser type and version, operating system and platform, the average time spent on our site, pages viewed, information searched for, access times and other relevant statistics. We use this information in the aggregate to measure the use of our site and to administer and improve our site.

We also use cookies to enable our customers to access our secure online web-applications. Cookies are pieces of information that a web site transfers to the hard drive of a visitor’s computer for record-keeping purposes. These cookies are created at the time of login to the system and are deleted when a customer’s logged in session is ended.

Customers who login to an application from our website may decline to accept the cookie, but declining this cookie will deny access to the application. Most browsers used by visitors have options that allow the visitor to control whether the browser will accept cookies, reject cookies, or notify the visitor each time a cookie is sent, but setting a browser to reject cookies will interfere with logging onto applications on our site.
To the extent required or permitted by law, we may also collect, use and disclose personal information in connection with security related or law enforcement investigations or in the course of cooperating with authorities or complying with legal requirements.

We take commercially reasonable precautions to keep all information obtained from our online visitors secure against unauthorized access and use and we periodically review our security measures.

Our site contains links to other web sites. These sites are not covered by this privacy statement, and we are not responsible for the privacy practices or the content of these other sites.

We reserve the right to modify this privacy statement and related business practices at any time by posting updated text on this site.


Core Business Solutions utilizes some of the most advanced technologies for Internet security available today. Transport Layer Security (TLS) technology protects your information using both server authentication and data encryption, ensuring that your data is safe. With the additional option of customer controlled access lists, you can be sure that your data will be completely inaccessible to your competitors.

The CORE Compliance Platform (CORE) allows for each user in your organization to have a unique user name and password that must be entered each time a user logs on. CORE issues a session cookie only to record session information for the duration of a specific session. The session cookie does not include the password of the user. Core Business Solutions does not use cookies to store other confidential user and session information, but instead implements more advanced security methods based on dynamic data and encoded session IDs.

In addition, is hosted in a secure server environment that uses a firewall and other advanced technologies to prevent interference or access from outside intruders.

Last updated: February 29, 2024