Our employees are working from home in every part of the province to serve you. For important information and to find out more about our measures, see our information section.
By accessing Promutuel Insurance’s website, users agree and accept to comply with the following terms and conditions as well as those mentioned in the Legal Notes.
The information requested in Promutuel Insurance’s forms is used to create a customer file in order to respond to the customer’s needs. Promutuel Insurance and its employees commit to keeping confidential all personal, business and financial information to which they have access in the performance of their duties. Following the submission of an application, Promutuel Insurance may use the information provided by a customer to offer them products and services that meet their needs.
With a user’s consent, Promutuel Insurance may collect information about them.
Promutuel Insurance may share information to third parties subjet to the following conditions:
Promutuel Insurance does not, under any circumstances, sell or distribute information about its customers or customer lists to third parties.
Except in the above-mentioned cases, no identifying information will be shared with third parties.
Promutuel Insurance only uses or shares these customer lists to the extent permitted by law. Promutuel Insurance may use these lists to inform you about promotions, contests, or new products.
Users have the right to access information about them and to consult, verify and correct their file. Promutuel Insurance will make a reasonable effort to respond to written requests from users.
Please submit questions, concerns or complaints in writing to the address found in the Complaint Process section.
Promutuel Insurance implements security measures based on recognized best market practices, legal obligations, and regulatory compliance to protect your personal information.
These constantly evolving security measures include asset management, human resources management, access control, encryption measures, secure use of technology, communications, supplier relations, compliance, and security incident management.