Our policy is simple: We collect no personal information about you unless you choose to provide that information to us. We do not give, share, sell, or transfer any personal information to a third party. Some of our web pages (such as Info-Share) let you voluntarily submit personal information. In those cases, we will provide a specific notice before you begin submitting any personal information, explaining how your information will be safeguarded. If you want to know more about how we record non-personal information about your visit or how we use information that you voluntarily submit, read on.
1. Non-Personal Information We Record
If you do nothing during your visit but browse through the website, read pages, or download information, our website's operating system will automatically record some general information about your visit. During your visit, our web operating system will record:
- The Internet domain for your Internet service, such as "xcompany.com" or "xcompany.net" if you use a private Internet access account, or "yourschool.edu" if you connect from a college or university domain.
- The type of browser (such as "Chrome version X" or "Firefox version X") that you are using.
- The type of operating system that you use (such as Macintosh, Unix, or Windows).
- The date and time you visit our site, and the web pages that you visit on our site.
- The address of the previous website you were visiting, if you linked to us from another website.
We use this information for statistical analysis, to help us make our site more useful to visitors. This tracking system does not record information about individuals.
3. Information from E-mail You Send to Us
If you decide to send us an electronic mail message (e-mail), the message will usually contain your return e-mail address. If you include personally-identifying information in your e-mail because you want us to address issues specific to your situation, we may use that information in responding to your request. In other limited circumstances, including requests from Congress or other limited parties, we may be required by law to disclose information that you submit.
Also, e-mail is not necessarily secure against interception. Please send only information necessary to help us process your request.
4. Links to Other Sites
Our policy discloses the privacy practices for the ICDR website only. ICDR does provide links to other websites. When you leave www.icdr.acl.gov, you will be going to sites that are beyond our control. We try to ensure that links that leave our site are clearly labeled, usually with an icon. These other sites may send their own cookies to users, collect data, or solicit personal information. The privacy policies and procedures described here for the ICDR site do not apply to any external links. We encourage you to read the privacy policies of any site you link to from ours, especially if you share any personal information. Be informed. You are the person best qualified to protect your own privacy.
- Social Media
ICDR may use third-party social media sites to provide ICDR content in formats that may be useful or interesting; however, icdr.acl.gov is the official source of information from the ICDR. ICDR cannot attest to the accuracy of other information provided by these or any other linked sites. Using these third-party sites does not constitute an endorsement by ICDR or any of its employees of the sponsors of the sites or the information or products presented on the sites. Also, please be aware that the privacy protection provided at icdr.acl.gov may not be available on these third-party sites. Please note that when ICDR uses social media sites, ICDR does not collect or in any way use personally identifiable information.
If you have questions about this policy, please contact ICDRinfo@neweditions.net.
Site Security & Intrusion Detection
For security purposes and to make sure this service remains available to all users, we use special software programs for monitoring network traffic to identify unauthorized attempts to upload or change information, or otherwise to cause damage to this government computer system. These programs collect no information that would directly identify individuals, but they do collect information that could help us identify someone attempting to tamper with this website.
If you use this system, you should understand that all activities may be monitored and recorded. Anyone using this system expressly consents to such monitoring. WARNING — If such monitoring reveals possible evidence of criminal activity, monitoring records may be provided to law enforcement officials. Except for authorized law enforcement investigations, we make no other attempts to identify individual users or their usage habits. We only use raw monitoring data logs for determining trends in usage patterns and in diagnosing system problems.
If you have any questions or comments about the information presented here, please forward them to email@example.com.