1. Information Collection
We or third parties may collect information from our users at several different points.
- A cookie is a piece of data stored on the user’s computer tied to information about the user. We may use both session ID cookies and persistent cookies. For the session ID cookie, once the user closes the browser, the cookie simply terminates. A persistent cookie is a small text file stored on the user’s hard drive for an extended period of time. Persistent cookies can be removed by following the user’s internet browser help file directions. We may store a cookie on each user’s machine that contains user specific information. You can configure your browser to accept all cookies, reject all cookies, or notify you when a cookie is set. If you reject all cookies, you may not be able to take full advantage of all offerings. However, not all Services require that you accept cookies. Use of the Services may execute code known as a “web beacon.” This code allows us to understand the time and date of when a user has opened an email. Our web beacons do not collect personally identifiable information.
- Log Files – Like most standard website servers we use log files to log certain information about how you use our website. This information may be stored on third party servers, and may be used by us or third-party service providers in order to assess general user interest in various internal and third-party products and services. We do not, however, collect IP addresses or log IP address information.
- We do not respond to web browser “do not track” or other related mechanisms at this time.
2. Legal Disclaimer
Though we make every effort to preserve user privacy, we may need to disclose personal information when required by law wherein we have a good-faith belief that such action is necessary to comply with a current judicial proceeding, a court order or legal process served by us or affiliates. If we’re going to turn over information related to you, we will use commercially reasonable efforts to provide you with advance notice, unless we are prohibited from doing so by law or court order.
3. Information Security
We have technical, administrative and physical safeguards in place to help protect against unauthorized access to, use or disclosure of user information we maintain. Sensitive records are to be retained only as long as necessary for business or legal needs and destroyed before disposal. Although we work hard to protect personal information that we collect and store, no program is one hundred percent secure and we cannot guarantee that our safeguards will prevent every unauthorized attempt to access, use or disclose personal information.
4. Notification of Changes