Here is how we handle information about your visit to our website:
Information Collected and Stored Automatically
If you do nothing during your visit but browse through the website, read pages, or download information, we will gather and store certain information about your visit automatically. This information does not identify you personally. We automatically collect and store only the following information about your visit:
- The Internet domain (for example, “youragency.gov” if you connect from a government domain, “yourschool.edu” if you connect from a university's domain, or “xcompany.com” if you use a private Internet access account) and IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access our website;
- The type of browser and operating system used to access our site;
- The date and time you access our site;
- The pages you visit; and
- If you linked to our website from another website, the address of that website.
We use this information to help us make our site more useful to visitors to learn about the number of visitors to our site and the types of technology our visitors use. We do not track or record information about individuals and their visits. We do not enable "cookies." (A "cookie" is a file placed on your hard drive by a website that allows it to monitor your use of the site.)
If You Send Us Personal Information
If you choose to provide us with personal information as in an email to one of our online email boxes, or by filling out a form with your personal information and submitting it to us through our website we use that information to respond to your message and to help us get you the information you have requested. We do not collect personal information for any purpose other than to respond to you. We collect personally identifiable information (name, email address, or other unique identifier) only if specifically and knowingly provided by you.
Links to Other Sites
We ensure that our website remains available to all users by employing software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.