This policy describes in general terms how GKM protects the privacy of your personal information, the types of personal information we collects how it is used and with whom your information may be disclosed to or shared with. Our Privacy Policy may be reviewed from time to time to ensure that it is appropriate to our operations and services.

This notice applies to all information collected or submitted on the website. On some pages, you can make requests, and register to receive materials. The types of personal information collected at these pages are Name, Email Address and Phone Number.
We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties. You can register with our website if you would like to receive our newsletter as well as updates on our services. Information you submit on our website will not be used for this purpose unless you fill out the applicable registration form.

We use non-identifying and aggregate information to better design our website but we would not disclose anything that could be used to identify those individuals.

Third Party Disclosure

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.


The CAN SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
To be accordance with CAN SPAM we agree to the following:

  • NOT use false, or misleading subjects or email addresses
  • Identify the message as an advertisement in some reasonable way
  • Include the physical address of our business or site headquarters
  • Monitor third party email marketing services for compliance, if one is used.
  • Honor opt-out/unsubscribe requests quickly
  • Allow users to unsubscribe by using the link at the bottom of each email

GKM takes steps to safeguard personal information held from misuse, loss, unauthorized access, modification and disclosure.

Personal information is stored in limited access servers and we operate data networks protected by industry standard firewall and password protection systems. We maintain physical, electronic and procedural safeguards to protect the integrity and privacy of these servers and your information.
In addition, all of our staff are trained on the importance of the protection of personal information and the steps they need to take to safeguard it.

Subscribe to our Newsletter: