Information We Collect Automatically
If you visit our website to browse, read, or download information:
- Your web browser automatically sends us (and we may retain) information such as the:
- We will use this information as aggregate data to help us maintain this site, e.g., to determine the number of visitors to different sections of our site, to ensure the site is working properly, and to help us make our site more accessible and useful.
- We will not use this information to identify individuals, except for site security or law enforcement purposes.
- We will not obtain personally-identifying information about you when you visit our site, unless you choose to provide such info.
Other Information We Collect
If you choose to identify yourself (or otherwise provide us with personal information) when you use our online forms:
- If you request information, services, or assistance, we may disclose your personal information to those third parties that (in our judgment) are appropriate in order to fulfill your request. If, when you provide us with such information, you specify that you do not want us to disclose the information to third parties, we will honor your request. Note, however, that if you do not provide such information, it may be impossible for us to refer, respond to or fulfill your request.
- If your communication relates to a law enforcement matter, we may disclose the information to law enforcement agencies that we deem appropriate.
How Long We Keep Information
We may keep information that will collect for an unlimited period of time.
Please note that electronic communication, particularly email, is not necessarily secure against interception. Please do not send sensitive data (e.g., Social Security, bank account, or credit card numbers) by email or web form.
For site security purposes this website employs software programs to monitor network traffic. Anyone using this system consents to the monitoring of their use by system or security personnel. Unauthorized use, tampering with or modification of this system – or its supporting hardware or software – may violate laws or statutes and may subject the violator to criminal and civil penalties. In the event of unauthorized intrusion, all relevant information regarding possible violation of law may be provided to law enforcement officials.