Phone

(770) 637-9300

Monday - Friday

9AM to 6PM

PRIVACY POLICY

Effective Date: February 8, 2026
Last Updated: February 8, 2026

1. INTRODUCTION

McDonald Technology Consultants, Inc. DBA MTC Group (“we,” “us,” “our,” or “Company”) operates the website roisecuritysavings.com and provides security consulting and risk management services. This Privacy Policy describes how we collect, use, disclose, and protect personal information obtained through our website, services, and business operations.

By accessing our website or engaging our services, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy. If you do not agree with this Privacy Policy, please do not use our website or services.

2. INFORMATION WE COLLECT

2.1 Personal Information You Provide

We collect personal information that you voluntarily provide to us, including but not limited to:

  • Contact Information: Name, business name, email address, phone number, mailing address, job title, and company affiliation (including information submitted through our website contact forms such as name, email, phone number, and address)
  • Account Information: Username, password, and security credentials for accessing our monitoring platforms and client portals
  • Business Information: Company details, industry sector, security requirements, facility locations, and operational data
  • Financial Information: Billing address, payment card information, bank account details, and transaction history
  • Communication Data: Information contained in correspondence, emails, phone calls, chat messages, and support tickets
  • Service Request Information: Details about security assessments, investigation requests, guard deployment specifications, and monitoring requirements

2.2 Information Collected Automatically

When you access our website or use our services, we automatically collect certain information, including:

  • Device and Usage Data: IP address, browser type, operating system, device identifiers, referring URLs, pages viewed, time spent on pages, and access times
  • Cookies and Tracking Technologies: We use cookies, web beacons, pixel tags, and similar technologies to collect information about your browsing behavior and preferences
  • Location Data: Geographic location information derived from IP addresses or GPS data from monitoring equipment and mobile devices used in service delivery

2.3 Information from Security Services

In the course of providing our security services, we may collect:

  • Video Surveillance Data: CCTV footage, recorded video monitoring feeds, and image captures from security cameras, including video analytics outputs (such as object detection, event tagging, and other automated insights) where enabled by the client or applicable deployment
  • Access Control Data: Badge swipe records, biometric data (where authorized), entry and exit logs, and visitor information
  • Monitoring Data: Real-time alerts, incident reports, patrol logs, and security event records, including data generated through real-time monitoring and remote access services
  • Tracking Data: GPS coordinates, route information, geofencing events, sensor telemetry, and location tracking from in-transit security systems (e.g., smart locks and tracking devices) and deployed personnel where applicable
  • Investigation Data: Evidence, witness statements, documentation, and findings related to security investigations
  • Guard Service Data: Personnel records, shift logs, performance metrics, and incident reports

2.4 Information from Third Parties

We may receive information about you from:

  • Business Partners: Security technology vendors, integration partners, and subcontractors involved in service delivery
  • Public Sources: Publicly available information relevant to security assessments and background checks
  • Client Organizations: Information provided by your employer or organization when they engage our services

3. HOW WE USE YOUR INFORMATION

We use the collected information for the following purposes:

3.1 Service Delivery

  • Providing integration services, in-transit security, monitoring, guard services, security assessments, and investigations
  • Operating and maintaining 24/7/365 monitoring systems and real-time access platforms
  • Deploying and managing security personnel, equipment, and technology solutions
  • Conducting physical security assessments and vulnerability analyses
  • Performing fraud investigations, theft investigations, and misconduct inquiries
  • Providing white-label services to partner organizations

3.2 Business Operations

  • Processing payments, managing billing, and maintaining financial records
  • Communicating with clients regarding services, updates, and support
  • Responding to inquiries, requests, and customer service needs
  • Managing user accounts and access credentials
  • Performing ROI analysis and reporting, including evaluating security investments, cost reduction opportunities, and performance outcomes (using information collected through assessments, monitoring, and service delivery, as applicable)
  • Analyzing and improving our services, operations, and ROI methodologies

3.3 Technology and Analytics

  • Implementing and optimizing AI-driven monitoring and automation systems
  • Analyzing security data to identify patterns, threats, and improvement opportunities
  • Developing and enhancing technology integrations and smart security solutions
  • Generating reports, metrics, and performance analytics for clients

3.4 Legal and Security

  • Complying with legal obligations, court orders, and regulatory requirements
  • Protecting against fraud, security threats, and illegal activities
  • Enforcing our terms of service and contractual agreements
  • Defending legal claims and protecting our rights and property

3.5 Marketing and Business Development

  • Sending newsletters, promotional materials, and service updates (with consent where required)
  • Analyzing market trends and customer needs
  • Improving our website and user experience

4. HOW WE SHARE YOUR INFORMATION

4.1 Service Providers and Partners

We may share information with third-party service providers and vetted partners who assist us in:

  • Technology integration and equipment installation
  • Cloud hosting and data storage services
  • Payment processing and financial services
  • Guard service providers and security personnel agencies (including sourcing, vetting, management, and deployment support)
  • GPS tracking, smart lock, video, robotics, and logistics technology providers used in in-transit security and monitoring solutions
  • Video monitoring, analytics, and automation technology vendors used to deliver real-time monitoring and remote access capabilities
  • Background check and screening services
  • IT support and cybersecurity services

We share information only as needed to deliver services, conduct security assessments, perform ROI analysis, and support operations. These third parties are contractually obligated to protect your information and use it only for the purposes we specify.

4.2 Client Organizations

When services are engaged by an organization on your behalf, we may share information with that organization in accordance with our service agreements.

4.3 White-Label Partners

We may share information with partners for whom we provide white-label monitoring and security services, as necessary to fulfill service obligations.

4.4 Legal Requirements

We may disclose information when required by law, including:

  • Responding to subpoenas, court orders, or legal processes
  • Complying with law enforcement requests
  • Protecting our rights, property, or safety, or that of others
  • Investigating or preventing illegal activities or security threats

4.5 Business Transfers

In connection with a merger, acquisition, reorganization, or sale of assets, your information may be transferred to the acquiring entity.

4.6 With Your Consent

We may share information with third parties when you have provided explicit consent.

5. DATA SECURITY

As a security-focused organization, we implement robust physical, technical, and administrative safeguards to protect your information, including:

  • Encryption: We use industry-standard encryption protocols for data transmission and storage
  • Access Controls: Strict authentication requirements and role-based access limitations
  • Monitoring: Continuous security monitoring and threat detection systems
  • Physical Security: Secure data centers with controlled access and environmental protections
  • Personnel Training: Regular security awareness training for all personnel
  • Vendor Management: Due diligence and contractual security requirements for third-party providers
  • Incident Response: Comprehensive incident response and breach notification procedures
  • Industry Standards Alignment: Where applicable to a client engagement or solution design, we align our security practices with recognized industry frameworks and supply chain security standards (such as TAPA and C-TPAT) to help safeguard sensitive security, tracking, and surveillance data.

Despite our efforts, no security system is impenetrable. We cannot guarantee the absolute security of your information.

6. DATA RETENTION

We retain personal information for as long as necessary to:

  • Fulfill the purposes outlined in this Privacy Policy
  • Comply with legal, regulatory, and contractual obligations
  • Resolve disputes and enforce our agreements
  • Maintain business records and historical data for security analysis

Surveillance and Monitoring Data: Video footage, access logs, and monitoring records are typically retained for 30 to 365 days, depending on client requirements, contractual obligations, and legal requirements.

Investigation Data: Information related to security investigations is retained for the duration of the investigation and as long as legally required thereafter.

Business Records: Financial records, contracts, and business communications are retained in accordance with applicable record-keeping laws.

When information is no longer needed, we securely delete or anonymize it in accordance with data protection best practices.

7. YOUR RIGHTS AND CHOICES

Depending on your location, you may have certain rights regarding your personal information:

7.1 Access and Correction

You may request access to your personal information and request corrections to inaccurate or incomplete data.

7.2 Deletion

You may request deletion of your personal information, subject to legal and contractual retention requirements.

7.3 Objection and Restriction

You may object to certain processing activities or request restrictions on how we use your information.

7.4 Data Portability

You may request a copy of your personal information in a structured, commonly used format.

7.5 Opt-Out

You may opt out of receiving marketing communications by following the unsubscribe instructions in our emails or contacting us directly.

7.6 Cookie Preferences

You may manage cookie preferences through your browser settings, though this may affect website functionality.

To exercise these rights, please contact us using the information provided in Section 13.

8. COOKIES AND TRACKING TECHNOLOGIES

We use cookies and similar technologies to enhance your experience and collect usage information.

8.1 Types of Cookies

  • Essential Cookies: Required for website functionality and security
  • Performance Cookies: Help us understand how visitors use our website
  • Functional Cookies: Remember your preferences and settings
  • Marketing Cookies: Track visitor behavior for advertising purposes

8.2 Managing Cookies

You can control cookies through your browser settings. However, disabling cookies may limit your ability to use certain website features.

9. THIRD-PARTY WEBSITES AND SERVICES

Our website may contain links to third-party websites and services. We are not responsible for the privacy practices of these third parties. We encourage you to review their privacy policies before providing them with personal information.

10. INTERNATIONAL DATA TRANSFERS

Our operations may involve transferring information to countries outside your jurisdiction. We implement appropriate safeguards, including:

  • Standard contractual clauses approved by relevant authorities
  • Privacy Shield certifications (where applicable)
  • Other legally recognized transfer mechanisms

By using our services, you consent to such transfers.

11. CHILDREN’S PRIVACY

Our services are directed to businesses and professionals. We do not knowingly collect personal information from individuals under 18 years of age. If we become aware that we have collected information from a child, we will take steps to delete it promptly.

12. CHANGES TO THIS PRIVACY POLICY

We may update this Privacy Policy periodically to reflect changes in our practices, services, or legal requirements. We will post the updated policy on our website with a revised “Last Updated” date. Material changes will be communicated through email or prominent website notice.

Your continued use of our services after changes become effective constitutes acceptance of the revised Privacy Policy.

13. CONTACT INFORMATION

If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:

MTC Group
Email: info@mtcsecuritygroup.com
Phone: (770) 637-9300
Website: roisecuritysavings.com

For privacy-related inquiries, please include “Privacy Request” in the subject line.

14. JURISDICTION-SPECIFIC PROVISIONS

14.1 California Residents (CCPA/CPRA)

California residents have additional rights under the California Consumer Privacy Act:

  • Right to know what personal information is collected and how it is used
  • Right to delete personal information (subject to exceptions)
  • Right to opt out of the sale of personal information (we do not sell personal information)
  • Right to non-discrimination for exercising privacy rights

To exercise these rights, contact us at the information provided above.

14.2 European Economic Area (GDPR)

For individuals in the EEA, we process personal information based on:

  • Contractual necessity: To fulfill our service agreements
  • Legitimate interests: To operate our business and improve services
  • Legal obligations: To comply with applicable laws
  • Consent: Where you have provided explicit consent

You have the right to lodge a complaint with your local data protection authority.

14.3 Other Jurisdictions

If you are located in another jurisdiction with specific privacy laws, we will comply with applicable requirements. Please contact us to learn more about your rights.


This Privacy Policy is effective as of February 8, 2026.