Privacy & Security Policy

 

The privacy of our visitors is of utmost importance to us. We collect no personally identifiable information about you when you visit this site unless you choose to provide that information.

For each HTTP request (which is what your Web browser generates when you request a page or part of a page from a Web site) received, we collect and store only the following information:

We use the information that we automatically collect to measure the number of visitors to the different areas of our sites, and to help us make our pages more useful to visitors. This includes analyzing these logs periodically to determine the number of pages served, and the level of demand for pages and topics of interest.

How Long is the Information Retained?

The logs for each day, with no personal information, are maintained indefinitely.

Cookies

This site does not use "persistent cookies" or any other persistent tracking methods to collect personally identifiable information about visitors to our Web pages. Cookies are small files that Web servers place on a user's hard drive. They can serve several purposes:

To protect your privacy, be sure to close your browser completely after you have finished conducting business with a Web site that does use cookies. If you are concerned about the potential use of the information gathered from your computer by cookies, you can set your browser to prompt you before it accepts a cookie. Most Internet browsers have settings that let you identify and/or reject cookies.

Site Security

For site security purposes and to ensure that this service remains available to all users, this site employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage to the information on our site. Unauthorized attempts to upload information or change information on this service (“hacking”) are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act. Except for these authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits.