If you want to know more about how we record non-personal information about your visit or how we use information that you voluntarily submit, read on.
2. Non-personal Information We Record
If you do nothing during your visit but browse through the website, read pages, or download information, our website's operating system will automatically record some general information about your visit.
During your visit, our web operating system will record:
- The Internet domain for your Internet service, such as "xcompany.com" or "xcompany.net" if you use a private Internet access account, or "yourschool.edu" if you connect from a college or university domain.
- The type of browser (such as "Netscape version X" or "Internet Explorer version X") that you are using.
- The type of operating system that you use (such as Macintosh, Unix, or Windows).
- The date and time you visit our site, and the web pages that you visit on our site.
- The address of the previous website you were visiting, if you linked to us from another website.
We use this information for statistical analysis, to help us make our site more useful to visitors. This tracking system does not record information about individuals.
On certain web pages, we use “cookies” to help you use our websites interactively. A cookie is a small file that a website transfers to your computer’s hard disk, usually to keep track of you while you are connected to that site. The cookie makes it easier for you to use the dynamic features of these web pages, without having to provide the same information again as you move from one page to another.
4. Information from E-mail You Send to Us
If you decide to send us an electronic mail message (e-mail), the message will usually contain your return e-mail address and name. If you include personally-identifying information in your e-mail because you want us to address issues specific to your situation, we may use that information in responding to your request. In other limited circumstances, including requests from Congress or limited other parties, we may be required by law to disclose information that you submit.
Also, e-mail is not necessarily secure against interception. Please send only information necessary to help us process your request.
5. Information Collected from Interactive Forms
On some of our web pages we offer interactive forms that let you voluntarily submit personal information (such as your e-mail address and name). In those cases, all submitted information is used only for the expressed purposes for which it is intended and is not made available to any third party.
6. Links to Other Sites
Our policy discloses the privacy practices for our website. But we provide links to other websites. When you leave our site, you will be going to sites that are beyond our control. We try to ensure that links that leave our site are clearly labeled. These other sites may send their own cookies to users, collect data, or solicit personal information. The privacy policies and procedures described here do not apply to any external links. We encourage you to read the privacy policies of any site you link to from ours, especially if you share any personal information. Be informed. You are the person best qualified to protect your own privacy.
7. Site Security & Intrusion Detection
For security purposes and to make sure this service remains available to all users, we use special software programs for monitoring network traffic to identify unauthorized attempts to upload or change information, or otherwise to cause damage to this government computer system. These programs collect no information that would directly identify individuals, but they do collect information that could help us identify someone attempting to tamper with this Web site.
If you use this system, you should understand that all activities may be monitored and recorded. Anyone using this system expressly consents to such monitoring. WARNING — If such monitoring reveals possible evidence of criminal activity, monitoring records may be provided to law enforcement officials.
Except for authorized law enforcement investigations, we make no other attempts to identify individual users or their usage habits. We only use raw monitoring data logs for determining trends in usage patterns and in diagnosing system problems.
If you have questions about this policy, please contact email@example.com.