Bringing powerful connections to your supply chain pays—and it’s not as complicated as you might think. Reach out to an Elemica consultant and see how you can start transforming your supply chain today.
The following information summarizes the key elements of our:
We may use information you provide us, such as requesting information or registering on Elemica.com, to respond to your inquiries, contact you about our Services, improve our offerings, and conduct research.
If you are a Client of Elemica, we must collect certain information about your company and the transactions you wish to perform to provide the Services, to communicate with you, and for various internal purposes.
Click here to read our policy notice before submitting your information for any position based in the EU.
Please use the following link for any related data subject request matters. Data Subject Request Form
We may disclose information to third parties we engage to help us provide our Site or Services, to comply with the law or protect our rights, and in anonymous, aggregated form. If you are a Client of Elemica, we must transfer some information to facilitate the provides of the Services.
To change your marketing preferences or to access, update, amend, delete or correct your information, contact us at firstname.lastname@example.org.
GDPR Statement includes information about Elemica’s statement on its status of GDPR compliance.
Elemica employs a defense-in-depth approach to securing its systems (internal), production and non-production applications and customer data. Elemica understands that the confidentiality, integrity, and availability of our customers’ data are vital to their business operations and our own success. We use a multi-layered approach to protect key information, monitoring and improving our application, systems, and processes to meet the growing demand and challenges of security. Your data will be completely inaccessible to your competitors.
Elemica’s systems and applications are hosted in a secure server environment that uses a firewall and other advanced technology to prevent interference or access from outside intruders.