Effective: December 27th, 2011
This site performs the following basic functions; share information with the public, offer services to our users via password protected (and/or otherwise protected) pages, and provide public services (such as e-mail) required by our users.
Public Website Privacy
This section applies primarily to our public website. It also forms a basis for the policy applied to other services. Our website has links to other websites and services, to which this policy does not apply. If you are concerned about the privacy policies of the sites we link to, please verify their policies. Our policy does NOT apply to them.
Personal Information Collection on the Website
We do not collect personally identifiable information about users browsing the published (public) data on this website.
The only personally identifiable information we collect is on our comments form. We collect a name for display with the comment, possibly a URL (for use as a link to the originator), the originating IP address, and an e-mail address to use in verifying the sender. We do not publish the e-mail addresses, but may use them to correspond about the comment. The information collected with the comments is not linked to other information, but it is used to determine if the comment is Spam.
Anonymous Information Collected on the Website
We record information in our traffic logs for all accesses to the website. This includes the time, originating IP address, requested URL, browser identification, and other standard log data.
We aggregate this information as part of managing, maintaining, and reporting on the site performance. This information is not rented, or sold to third parties. We may share this information if required by law or to aid the investigation of attempts to subvert our security.
We make no attempt to link to this data to personally identifiable information we collect.
Third-party Cookies and Advertising
Third parties, including Google, may place cookies on your browser, or using web beacons to collect information about your activities. Google’s and its partners may use of DART cookies to serve ads based on your visit to this site and/or other sites on the Internet.
You may opt out of the use of Google’s DART cookie by visiting the advertising opt-out page. Alternatively, your can opt out of some, but not all, use of third-party cookies by visiting the Network Advertising Initiative opt-out page.
The SMTP protocol specifies information such as originating server identification (IP address, DNS name, and identification), and originating sender be recorded in the message by each server that handles the message. This information is gathered by our server.
We gather and record extensive information about incoming email in a database. This includes the above information as well as the recipient(s), current information available from DNS, whitelists, blacklists, and actions taken to verify the legitimacy of the message, and timing information. This information is used to separate Spam and its originators from legitimate email and senders.
We aggregate this data to perform research into the characteristics of different classes of senders including personal senders, automated systems, and Spam networks. Detailed information may be used to investigate problems, or deal with Spam. Collected information may be forwarded to proper authorities as required to do their activities.
Services to users and Security subversion
We will attempt to link log data to personally identifiable information where attempts to subvert the security of our site is detected. This linking will be restricted to attempting to identify persons responsible for or providing resources used for the attempt (successful or not).
If you access or attempt to access non-anonymous and/or secured services we may link personally identifiable to other tracking data. This information is gathered used to ensure the security and operation of the site, and investigate problems.
Unsecured access may be permitted on Local Area Networks (LANs), but secured access is required for remote access. Automated policies are in place to help ensure this is the case.