How we use your information to process
Wealth Management Canada uses the information we collect about you for the following general purposes:
- To follow through with your requests regarding financial needs, family earnings, asset allocation needs.
- To answer your questions by referring to the given information.
- To develop and improve our own current and future service to you.
- To contact you with a wealth manager who may be a match for you.
With whom we share your information
We will share personal information with the Wealth Managers in our database only when we have your consent to do so. We encrypt many of our services using (SSL) to ensure your information is confidential and solely shared amongst authorized experts to properly determine your wealth management needs.
How long we keep your information for
We will use reasonable efforts to comply with your request; we take reasonable steps to ensure that your information is relevant to its intended use, accurate, and complete. We may retain certain information associated with your account in our archives for recordkeeping integrity. The periods for which we retain your information depend on the time that is takes for you to choose your wealth manager.
Your rights and choices with respect to the collection and use of your information
You can choose not to provide us with your personal information, although it may be needed to take advantage of service offered
We endeavor to ensure that your personal information is relevant to its intended use, accurate, and complete.
You can close your request for wealth management pairings by contacting us using the ‘contact us’ page. We will send you an email to confirm your request.
How we protect your information
We want you to feel confident about using Wealth Management Canada and we are committed to protecting the information we collect. We have implemented and continuously maintain appropriate physical, administrative, technical, and organizational measures to protect the personal information that you provide us with. We protect against unauthorized or unlawful access, use of disclosure, and against accidental loss, damage, alteration or destruction. For example, only authorized employees are permitted to access personal information, and they only may do so for permitted business functions. We go out of our way to employ firewalls and intrusion detection systems to help prevent unauthorized persons from gaining access to your information.