Web Site Privacy and Security
At Lehigh Technical, we take pride in operating with the highest levels of business ethics and integrity. That is why Lehigh Technical takes information security seriously and is committed to protecting your personal financial information. In addition, we are taking steps to provide information that can help protect your personal information and avoid numerous fraudulent and email scam activities.

We will not misuse information you provide
Lehigh Technical does not make your personally identifiable information available for marketing to third parties under any circumstances. When we request information from you, we ask for information we need to provide the service you've requested. When we provide you the opportunity to receive newsletters or other information, we may ask for information about your company to determine which of our business units can best serve you.

When you set up an account, maintain that account or place an order, we use the information you provide about yourself so we can complete that order. We do not share this information with outside parties. When you register for events or special promotions on our site, we give you the opportunity to receive additional information and updates on our products and related services. We will not use information you submit to our Website for this purpose unless you give us your consent on our online forms.

We use non-identifying and aggregate information to better design our Website and to share with our software publishers. For example, we may tell a publisher that a certain number of individuals visited a certain area on our Web site or that a certain number filled out a registration form, but we do not disclose anything that could be used to identify the individuals. We never use or share the personally-identifiable information provided to us online in ways unrelated to those described above without also providing you an opportunity to opt-out or otherwise prohibit such unrelated use.

Use of e-mail addresses:

Return e-mail addresses:
We use return e-mail addresses to answer the e-mail we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

E-mail messages to existing customers:
Out of respect for the privacy of our users we present the option not to receive e-mail messages related to product promotions and services.

E-mail addresses obtained from events:
We use e-mail addresses that we obtain through online forms, registration, seminars, and business reply cards to market our products and services. If you receive an e-mail message from us following such an event, we will give you the option not to receive future e-mail messages related to product promotions and services by replying to the message.

How to contact us
Should you have other questions or concerns about these privacy policies; send us an e-mail at

Links to other sites
This Website may contain links to other Web sites. Please be aware that Lehigh Technical is not responsible for the privacy practices of other Web sites. We encourage our users to be aware when they leave our site of the privacy statements of each Web site that collects personally identifiable information. This privacy statement applies solely to information collected by this Web site.


Lehigh Technical is committed to the safety of every employee. We believe our employees are our greatest asset, and we strive to provide the highest level of protection for them every day. Our goal is to work with business partners who share in our passion for safety and accident prevention, those who will provide safe working conditions, the safest equipment available, and quality training for our employees. Our valued Lehigh Technical employees have a personal responsibility to help carry out our safety vision.


It is Lehigh Technical's policy not to discriminate against any qualified employee or applicant with regard to any term or condition of employment because of such individual's disability or perceived disability as long as the employee can perform the essential functions of the job. Consistent with this policy of non-discrimination, Lehigh Technical will provide a reasonable accommodation to a qualified individual with a disability, as defined by the A.D.A. and A.D.A.A.A., who has made Lehigh Technical aware of his or her disability, provided that such accommodation does not constitute an undue hardship on Lehigh Technical.

Applicants or employees with a disability who believe they need a reasonable accommodation to perform the essential functions of their job must apply to the Director of Human Services. Lehigh Technical encourages individuals with disabilities to request a reasonable accommodation as soon as possible.


Website Privacy and Security
At Lehigh Technical, we take pride in operating with the highest levels of business ethics and integrity. That is why Lehigh Technical takes information security seriously and is committed to protecting your personal financial information. In addition, we are taking steps to provide information that can help protect your personal information and avoid numerous fraudulent and email scam activities.

Unfortunately individual and company identity theft is something that occurs every day. Even utilizing the most current security save guards known today, every organization is subject to these types of fraudulent scams.

Lehigh Technical is committed to any and all actions to protect our clients, customers and our organization. With that in mind, we have developed a security center to further educate individuals on fraudulent and e-mail scam activities and action steps to follow if a suspicious e-mail is received.

Suspicious E-Mail Messages
If you receive a suspicious e-mail message that appears to come from Lehigh Technical, please take the following steps:
  • Do not respond to the fraudulent e-mail message
  • Do not open any attachments
  • Do not click on any links
  • Do not provide any personal information
  • Forward the e-mail to
  • Add the e-mail address to your block senders or junk e-mail list
  • Finally delete the message from your personal e-mail inbox

E-Mail and Lehigh Technical
  • Lehigh Technical will never request personal information, including account numbers, Social Security numbers, user names, or passwords in an e-mail messages, fax, letter or pop-up window.
  • Lehigh Technical will never include unexpected attachments in its e-mails to clients
E-Mail and Internet Fraud
Identifying phony e-mail messages and internet fraud is not always easy and the criminals who use them are becoming more sophisticated about creating them every day. E-Mail fraud often referred to as "phishing: or "spoofing" involves a fraudster sending you an e-mail request that appears to be from a legitimate company or source.

Be advised that there are several prominent e-mail scams currently circulating that deliver an attachment which can infect your PC and steal personal information, including IDs and passwords. The attachment contains dangerous Trojan variants and if opened, may compromise a PC and harvest personal information for fraudulent use. Be on the lookout for these e-mails, and be wary of any suspicious e-mail especially one that you are not expecting. Do not open unknown attachments and do not follow links contained in these e-mails.

Important Suggestions to Protect Yourself from E-Mail Fraud
Recently, the Federal Trade Commission warned consumers about fraudulent e-mails, pop-up advertisements, and phony websites that attempt to trick people into providing confidential personal information. To avoid becoming a victim of "phishing" and other forms of e-mail fraud, we recommend the following: or

General Precautions
  • Never respond to or click on a link in a suspicious e-mail. Opening or clicking on a link could place a virus on your computer which can later capture your personal information.
  • Inspect the company logo used in e-mails and compare it to that used on the genuine website of that company. Look for any discoloration or disfiguration of the logo.
  • Do not launch e-mail attachments from an unknown sender.
  • Never log into your account through a link provided in an e-mail, even if it looks like it is coming from legitimate company or source you deal with regularly; instead, open a new browser and type the known Internet address for the company or source in the address bar.
  • If you receive e-mail from a known sender, do not launch an attachment without checking with the sender - even an e-mail that appears to be from your computer manufacturer or a friend could be a fraudulent e-mail containing a virus, Trojan horse, or worm.
  • Be selective when providing your e-mail address to a questionable source; sharing your e-mail address can make you more likely to receive fraudulent e-mails.
  • If you receive an e-mail that warns you that an account will be closed or online access will be terminated unless you reconfirm your billing information, contact the company cited in the e-mail using a telephone number or website address you know to be genuine.
  • Take the time to ask yourself whether this type of action is something the company would ask you to do.
  • Avoid sending any personal financial information over the Internet. If you must, make certain you are on a secure site and there is a padlock icon on your browser's status bar.
  • You may also wish to contact your Internet Service Provider for support in blocking e-mails or subscribing to a spam filter.
  • Fraudulent e-mails often use improper grammar and contain misspellings.

Spyware and viruses are not always detectable on your computer, whereas pop-ups can be easily seen. Be careful and you may be able to protect your personal information from these invasive online sources.

Spyware is a software program that may become installed on your computer without your knowledge or consent. Once there, the software can record keystrokes, send pop-up ads, and redirect your computer to certain websites.

Trojans are programs that can enable unauthorized people to access and send spam or other information from your computer.

Viruses, like their name implies, invade your computer system often through an e-mail attachment. They can wreak havoc on your operating system and also get into your address book and begin sending out e-mails from your system.

Worms reproduce themselves over a network and can shut your system down.

To protect your computer from Spyware and viruses, make sure that you have anti-Spyware and anti-virus programs installed and regularly updated. There are many anti-Spyware and anti-virus programs for you to consider. Consult a computer professional and contact your Internet Service Provider for recommendations and technical support.

Pop-Up Ads
Pop-ups are unsolicited advertising that appear as a "pop-up" window on your computer. These pop-ups can be created to look like a legitimate source and request personal information. You can set your computer preferences to block pop-ups, and you can also request spam-blocking programs from your Internet Service Provider.

General Precaution
  • Don't open unexpected attachments from known or unknown sources.
  • Protect your computer with the latest anti-Spyware and anti-virus programs.
  • Protect your computer with a software firewall and/or a hardware firewall.


Equal opportunity is a fundamental principle at Lehigh Technical. Lehigh Technical will provide employment and advancement opportunity for all qualified individuals without regard to race, color, creed, sex, religion, age, national origin, ancestry, marital status, physical or mental disability, veteran's status, or other characteristic protected by local, state or federal law. This principle applies to all employment decisions, including recruitment, selection, hiring, training, layoff, recall, leaves of absence, compensation, promotions, transfers, performance reviews, benefits, discipline, and any other term or condition of employment.