WHAT WE COLLECT AND HOW WE USE IT
Cookies. When you visit this site, we may send one or more cookies to your computer, so that we may uniquely identify your browser (a cookie is simply a tiny text file containing a string of characters). Accepting our cookies allows you to keep your user preferences from session to session. Although most browsers accept cookies by default, you can set your browser to refuse all cookies, or to tell you when you're being sent a cookie. Some features and services may not function properly if you have cookies disabled.
Log information. When you use our services, our servers automatically record information that your browser sends when you visit one of our websites. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request, and one or more cookies that may uniquely identify your browser.
HOW DO WE USE YOUR INFORMATION?
When you sign up for a particular service that requires registration, we ask you to provide personal information. You may decline to submit personal information to any of our services, in which case we may not be able to provide those services to you. Your email address is only used for current and future communications you’ve opted-in to receive. We never sell, share, or spam.
HOW DO WE SHARE YOUR INFORMATION?
We do not share your personal information with other institutions. However, we may share your personal information if we have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms Of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against imminent harm to the rights, property or safety of our organization, its users or the public as required or permitted by law.
We take commercially reasonable steps to implement appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These steps may include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data. We restrict access to personal information to our employees, contractors, and agents who need to know that information to operate, develop or improve our services. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations. We are not responsible, however, if unauthorized access to information occurs.
We review our data collection, storage, and processing practices to ensure that we only collect, store and process the personal information needed to provide or improve our services. We take reasonable steps to ensure that the personal information we process is accurate, complete, and current, but we depend on our users to update or correct their personal information whenever necessary.