We have adopted general policies and procedures concerning confidentiality, proprietary data and privacy of customer personal information, and the information we gather over the Workspace is protected by those policies and procedures. Generally, we collect non-public personal information about our clients, investors and third parties from the following sources:
- Information received from investors or prospective investors on subscription documents or other related documents or forms, including any information we collect on the Workspace; and
- Information about a transaction reviewed or entered into by the funds or accounts Castlelake manages, their respective affiliates, or others.
Our policy is that:
Castlelake takes precautions to maintain any nonpublic personal information about prospective, existing or former investors in funds or accounts it manages or has managed to anyone, except as permitted by law and regulation. Castlelake takes similar precautions to ensure that third party transactional information is not inappropriately disclosed to any other person.
Castlelake restricts access to nonpublic personal information to those employees and agents who need to know that information in order to provide services to Castlelake, the funds or accounts it manages. Castlelake maintains physical, electronic, and procedural safeguards to safeguard the nonpublic personal information and which Castlelake believes are adequate to prevent unauthorized disclosure of such information.
Collection of Information
In general, you can browse the non-password-protected sections of the Workspace without telling us who you are or revealing any personal information about yourself. We automatically track certain information that your browser makes available whenever you visit the Workspace. This information may include your Internet Protocol address, browser type, browser language and one or more files that may uniquely identify your browser. We use this information to operate, develop and improve our services.
Use and Disclosure of Information
You agree that we may use personal information about you to analyze Workspace usage, improve our content and customize the Workspace's content, layout, and services. These uses improve the Workspace and better tailor it to meet your needs, so as to provide you with a smooth, efficient, safe and customized experience while using the Workspace.
We may also share information about you if we believe that disclosure is required under law. For example, we may need to disclose information in response to a subpoena or to cooperate with regulatory or law enforcement authorities.
Control of Your Password and Personal Information
If you apply for a password to access password-restricted areas on the Workspace, you must provide to us such information as Castlelake may reasonably request.
You are responsible for all actions taken with your user name and password. Therefore, we recommend that you do not disclose your password to anyone. You may not allow others to use your user name or password to access or use any part of this Workspace. If your password has been compromised for any reason, you should contact us immediately for a new password.
You can review and change the information that you submit to us by contacting us at Investor.Relations@castlelake.com. You can change your User ID, email address, contact information, financial information, other personal information and user preferences. You must promptly update your personal information if it changes or is inaccurate.
On your request, we will deactivate your password and remove your contact information and financial information from our active databases. Your password will be deactivated promptly based on your account activity and in accordance with our deactivation policy.
Your information is stored on our servers located in the United States. We use procedural and technical safeguards to protect your personal information against loss or theft as well as unauthorized access and disclosure to protect your privacy, which may include encryption, "firewalls" and Secure Socket Layers. We treat data as an asset that must be protected against loss and unauthorized access. We employ security techniques to protect such data from unauthorized access by users inside and outside the company. However, "perfect security" does not exist on the Internet.
Conditions of Use