Skip to content

Privacy Policy

Last Updated: 10.7.2025

 

Introduction

Trinity Consulting Associates ("we," "us," or "our") is committed to protecting the privacy of our clients and website visitors. This Privacy Policy outlines how we collect, use, and protect your personal information in our consulting services for residential real estate agents in Kansas and Missouri.

 

Information We Collect

We collect personal and business information that you voluntarily provide to us when you express interest in our services or when you contact us. The types of information we may collect include:

  • Personal Information: Your name, email address, and phone number.

  • Business Information: Your business name and physical business address.

We do not use any tracking technologies like cookies on our website, so we do not collect data on your browsing activities. We also do not knowingly collect any personally identifiable information from minors. Our services are exclusively for adult residential real estate brokers / agents.

 

How We Use Your Information

We use the information we collect for the following business purposes:

  • To provide and manage our services to you.

  • To communicate with you about our services, proposals, and updates.

  • To personalize your experience and better respond to your individual needs.

  • To respond to your inquiries and support requests.

  • To process payments for our services.

Disclosure of Your Information (Data Sharing)

We do not sell or share your SMS text messaging originator opt-in data and consent and Personally Identifiable Information (PII) data with third parties except in the following limited circumstances:

  • Service Providers: We share your information with third-party vendors and service providers, such as HubSpot (our CRM) and payment processors, to perform services on our behalf. These parties are contractually obligated to keep your information confidential and secure.

  • Demographic Data: We may share demographic information (not PII) with third parties for marketing purposes, such as targeting potential clients with similar business profiles.

  • Legal Requirements: We may disclose your information if required to do so by law or in the good faith belief that such action is necessary to comply with a legal obligation.

 

Data Security

The security of your personal information is a top priority for us. We use a combination of organizational, technical, and physical security controls to protect your data from unauthorized access, use, or disclosure.

Organizational Security

  • Access Control: We adhere to the principle of least privilege and utilize Role-Based Access Control (RBAC). Access to your personal information is restricted to authorized personnel who require it to perform their job functions. These access rights are reviewed quarterly.

  • Employee Training: We undergo annual training on data privacy, information security best practices, and their responsibilities in protecting personal data.

  • Vendor Risk Management: We conduct security and privacy due diligence on our third-party vendors to ensure they meet our standards for data protection.

  • Data Minimization & Disposal: We only collect personal information that is necessary for our engagement. We retain this data only for as long as required and have secure disposal processes to delete or anonymize it when it is no longer needed.

  • Incident Response Plan: In the event of a data breach, we have a response plan in place to promptly investigate, contain the incident, and notify affected individuals and regulatory authorities as required by applicable law.

Technical Security

  • Encryption: We protect your data using encryption in transit (using TLS/SSL) and encryption at rest. This ensures your information is secure whether it is being transmitted to us or stored on our systems.

  • Multi-Factor Authentication (MFA): To prevent unauthorized access to our information systems, we mandate the use of multi-factor authentication (MFA/2FA) for all personnel. This requires a second form of verification in addition to a password, significantly strengthening account security.

  • Network Security: Our data is stored on secure servers located in SOC 2-certified data centers. Our service providers employ firewalls, intrusion detection systems, and other network security measures to prevent unauthorized access.

  • Vulnerability Management: We regularly scan our networks and systems for security vulnerabilities and apply necessary patches in a timely manner to mitigate risks from known and emerging threats.

  • Logging and Monitoring: We maintain and monitor audit logs of our systems to detect and investigate potential security threats, unauthorized access, or suspicious activity.

 

Disclaimer While we implement robust, commercially reasonable security measures to protect your information, please be aware that no security system is impenetrable. We cannot guarantee the absolute security of our databases, nor can we guarantee that information you supply will not be intercepted while being transmitted to us over the Internet.

 

Your Privacy Rights

You have the right to request the deletion of your personal information. If you wish to have your information deleted from our records, please send an email to: jsutterfield@trinityconsulting.associates. We will process your request in a timely manner.

 

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. The "Last Updated" date at the top of this policy will indicate when changes have been made. We encourage you to review this policy periodically.

 

Contact Us

If you have any questions or concerns about this Privacy Policy or our data practices, please contact us by email at: privacy@trinityconsulting.associates.