E-PROCUREMENT
toggle menu

Derive Technologies is committed to protecting your privacy. We have designed our sites so you may visit them without revealing any personal information.  However, we may ask you to provide information that personally identifies you in certain circumstances, including for example when you register for an event, request information or join one of our email notification services. Derive Technologies’ Web sites may contain links to sites controlled by, and pages maintained by, independent third parties. Derive Technologies does not control the use of personal information provided to such third parties and such information will be governed by the applicable third party’s privacy policy.

WHY DOES DERIVE TECHNOLOGIES COLLECT INFORMATION?

  1. To help us personalize Website content to you.
  2. To help improve the value of the information provided on our site to you.
  3. To alert you to Derive Technologies’ product and service offerings, events, and other new or updated information.
  4. To send information regarding upcoming events, training classes, products or service offerings to you through the US Mail or via electronic mail.
  5. To evaluate job applicants in the case of online job application submissions.
  6. To request your voluntary participation in research surveys.
  7. To provide you with online access to your account information.
  8. To solicit your self-submitted comments to our Blog and News entries. (Your comments are published at the discretion of Derive Technologies.)

As mentioned previously, Derive Technologies has designed its sites so that you may visit them without revealing any personal information.  However, in some instances, it is necessary for Derive Technologies to collect information on you in order to efficiently perform the service you may have requested.

At times you may receive promotions, specials, newsletters or other pertinent information from Derive Technologies. If you prefer not to receive those, you can opt out by sending us an email using the form below, or by mentioning it directly to your account manager.

Derive Technologies is committed to providing all customers with a world-class experience. In order to measure how well we are doing and to better understand how we can continually improve our product offerings and our ability to meet your unique requirements, from time-to-time we may contact you by phone or e-mail and solicit your participation in research. Your participation is voluntary and you may request to remove yourself from future efforts of this kind.

WHAT INFORMATION DOES DERIVE TECHNOLOGIES COLLECT?

Some of our services require you to register for an account.  In such instances, Derive Technologies may request personal data such as your first and last name, your company name, your physical addresses, your telephone number, a password, and your email address.  For other services, such as online purchases, we may request credit card or other payment information which we maintain in encrypted form on secure servers.

HOW DO I UPDATE MY INFORMATION?

In order to update your information, you can either request a change from a Derive Technologies employee or you may do it on your own online by visiting our site and logging in to your account.  Once there, you can access your “My Account” page and will find a “My Profile/Password” link that allows you to edit your information.

HOW DOES DERIVE TECHNOLOGIES SECURE MY INFORMATION?

As an existing customer, you have the opportunity to view and purchase quotes online, review your invoices, view and update support contracts as well as access your account team’s contact information.  Access to your personal information is restricted within our company to provide maximum security.  Only authorized programming personnel are permitted to see your password. If you forget your password, you can request a new one be created and emailed to you. Only authorized sales, customer service and accounting personnel are permitted access to your account and credit card information, which is stored in encrypted form on secure servers.

We employ powerful 128-bit encryption technology and Secure Socket Layers (SSL) in all areas where your personal identity is required.

USE OF COOKIES?

Certain portions of the Derive Technologies website may use cookies to enhance your experience. Cookies are pieces of information used for record-keeping and navigation-tracking purposes. Use of cookies makes web-surfing easier by performing certain functions such as saving your username, passwords or your personal preferences regarding your use of the particular website. Many consider the use of cookies to be an industry standard. Your browser is probably set to accept cookies. However, if you would prefer not to receive cookies, you can alter the configuration of your browser to refuse cookies. If you choose to have your browser refuse cookies, it is possible that some areas of the Derive Technologies website will not function properly when you view them. Derive Technologies will never use cookies as a means of infringing upon your privacy, but will only use cookies as a means of enhancing your experience with this website.

IP ADDRESSES

We collect an IP address from all visitors to the Derive Technologies websites. Your IP address is used to help diagnose problems with our server, to analyze trends, administer the site, track user's movement, and gather broad demographic information about aggregate site use.  IP addresses ARE NOT linked to personally identifiable information.

PROTECTION OF YOUR PERSONAL INFORMATION

Derive Technologies DOES NOT SELL PERSONAL INFORMATION TO ANY OUTSIDE SOURCES.  Additionally, Derive Technologies does not exchange, trade, give or relinquish personal information to any outside sources except in some instances for the following purposes: i) to complete a transaction that was initiated by you ii) to co-market to you with a strategic partner of Derive Technologies, or iii) to respond to subpoenas, court orders, or other legal processes, as required by law, or to establish or exercise our legal rights or defend against legal claims.  Additionally, your personal and account information may also be disclosed in connection with a sale of some or all of our business or a merger with another company.

YOUR ACCEPTANCE OF THESE TERMS

By using this site, you signify your consent to the Derive Technologies Internet Privacy Policy. We reserve the right, at our discretion, to change, modify, add, or remove portions from this policy at any time. Please check this page periodically for changes.

QUESTIONS

If you choose not to provide personal, or other, information, you can still use the majority of the Derive Technologies Web sites. If for some reason you believe Derive Technologies has not adhered to these principles, please notify us by using the form below, or by calling us, and we will use commercially reasonable efforts to promptly determine and correct the problem.

If you have any questions about this privacy statement, the practices of this website, or your dealings with this website, please contact:

Derive Technologies
40 Wall Street, 20th Floor
New York, NY 10005
(212) 363-1111

blog

25
Sep

Critical Issues for Datacenter Managers – Hybrid Multi-cloud Environments

25.09.2023
Today's datacenter managers are tasked with providing the underlying computational, networking, and storage infrastructure necessary to support a wide array of business services and applications for internal and external users. All of this must be...
25
Sep

Understanding Pros and Cons of Hybrid Multi-Cloud Platforms 101

25.09.2023
Derive's Datacenter Practice Lead, Heman Yung, discusses important aspects of hybrid multi-cloud platforms—strengths as well as potential challenges. Q: What is a hybrid multi-cloud platform? A hybrid multi-cloud platform is a combination of...
17
Aug

How to Prevent Internal IT Security Threats

17.08.2023
When companies think about preventing IT security threats, they automatically visualize hackers shrouded in hoodies writing malware code. However, organizations should keep in mind their own employees.  While some insider threats originate from...
17
Aug

How Emerging AI Creates Cybersecurity Risk

17.08.2023
Almost as soon as generative artificial intelligence (AI) technologies, such as ChatGPT, came on the scene, the public began to imagine dystopian scenarios. Critics of emerging AI warned of ChatGPT’s ability to create deep fakes. The comedian...
28
Jul

Transformative Advances in Healthcare Technology

28.07.2023
Technology as a whole continues to evolve rapidly and the healthcare arena is certainly no exception. In this blog we look at selected areas of advancements with commentary by Derive’s VP of Business Development, Bill...
27
Jul

Securing Mobile Devices for Remote Work: 10 Cybersecurity Tips for Businesses Prioritizing Protection

27.07.2023
In today's digital landscape, remote work has increasingly become the norm for businesses in every industry. As more employees work from home, the security of their mobile devices, particularly phones, has become a critical concern for...
10
Jul

What the SEC’s New Cybsercurity Requirements Mean For You

10.07.2023
Any business worth their salt has read the cyber landscape of the last few years and shored up their digital defenses to protect against attacks. The practice of cybersecurity protection, however, is soon to transition from a best practice into a...
21
Jun

How to Improve Your SMB’s Resiliency

21.06.2023
While the goal of IT security is to prevent cyberattacks, small and medium-sized businesses (SMBs) need to be prepared to recover quickly if a breach is successful. Rapid recovery lessens the economic and reputational impact of a breach. Resilient...
01
Jun

How to Improve Your Healthcare Organization’s Security Awareness

01.06.2023
Because healthcare organizations are often targeted by ransomware attacks through phishing emails, promoting security awareness is crucial. Hackers send emails to hospitals and medical centers that seem to come from co-workers or authority figures....
01
Jun

How Healthcare Organizations Can Create a Cybersecurity Framework

01.06.2023
As the target of ransomware and other types of cyberattacks, healthcare organizations need to follow a cybersecurity framework that prevents breaches and the resulting loss of patient data. A Cybersecurity Framework (CSF) is a set of guidelines and...
01
Jun

Top 3 Cyberthreats Faced by Healthcare Providers

01.06.2023
Today, no type of business or organization is exempt from cybersecurity risk. Healthcare providers find themselves targeted by advanced threats because the information in electronic health records (EHRs) is valuable. Hackers can sell patient...
01
Jun

5 Ways to Strengthen Your SMB’s Security Posture 

01.06.2023
Small and medium-sized businesses (SMBs) often lack the resources needed to adopt a strong security posture. Given the unrelenting escalation of cyberattacks, SMBs can’t afford to skimp on security. With attacks potentially costing companies...
22
May

3 Ways a Healthcare Tablet Can Improve Patient Care

22.05.2023
From admission to discharge, healthcare professionals rely on accurate data to deliver quality care. Positive patient identification, medication tracking, and staff communication are just a few of the crucial workflows hinging on dependable data...
17
May

Learning Models and Generative AI in Managed Cybersecurity Services

17.05.2023
As businesses big and small across the healthcare industry become increasingly reliant on technology to optimize and deliver patient care, effective managed cybersecurity services (outsourced management of security procedures and systems) have never...
16
Nov

Baseline Security Practices for the Modern SMB

16.11.2022
Baseline Security Practices for the Modern SMB Cyberattacks around the world are continuing to escalate in both frequency and severity, exacerbated by current global events. Ransomware attacks in particular are an ever-growing threat vector, with the...
17
Oct

5 Reasons Healthcare Cybersecurity Is Crucial

17.10.2022
5 Reasons Healthcare Cybersecurity Is Crucial Healthcare cybersecurity has never been more important. With cybersecurity attacks rising in frequency and severity in recent years, catalyzed by the Covid-19 pandemic and the ongoing war in Ukraine,...
01
Jun

Derive Tech's 3 Most Critical Cybersecurity Services for Enterprise Businesses

01.06.2022
Derive Tech's 3 Most Critical Cybersecurity Services for Enterprise Businesses Now more than ever businesses big and small are racing to fortify their cybersecurity defenses to protect themselves against online threats. Russian cyberattacks have...
01
Jun

Everything You Need to Know About Enterprise Cyberattacks in 2022

01.06.2022
Everything You Need to Know About Enterprise Cyberattacks in 2022 Cybersecurity threats against enterprise businesses, particularly sophisticated and high-value ransomware attacks, are growing more prevalent by the day…and largely originate...
25
Mar

Creating an Unbreakable Cold Chain for Proper Vaccine Storage

25.03.2020
Now more than ever, cold storage is the key to safeguarding vaccine efficacy. Temperature-sensitive medications like the top COVID-19 vaccines require careful tracking since even the smallest deviation above approved storage temperatures can...
04
Mar

How Hospitals are Increasing Asset Availability to Handle High Patient Volume

04.03.2020
Increased patient volume has long been a prevalent issue in healthcare. With every flu season, hospitals nationwide have adapted and converted facilities to accommodate a swell of patients. While COVID-19 hospitalizations have been in a...
17
Feb

Three Technologies Curbing the Prevalence of Healthcare Misidentification

17.02.2020
An estimated 1 in every 2,326 blood specimens is inaccurately labeled, translating into a recurrent error risk once every two weeks for a standard-sized hospital. Specimen and patient misidentification have been age-old issues in...
28
Jan

What are the Components of an Efficient Telehealth System?

28.01.2020
A mere five years ago, telehealth was slowly making its presence known, used by less than 20% of healthcare facilities in the U.S. However, during the coronavirus outbreak, that number skyrocketed by 154% within the first weeks of...
15
Jan

How Enhanced Mobility Overcomes the Challenges in Modern Healthcare

15.01.2020
Before the pandemic, new healthcare technologies such as telehealth and clinal mobile devices were already making an impact worldwide. However, now as we continue to move through unprecedented demands, the push for innovation has been superseded by...