A. Information that You Provide Us
In various places on the Site, we request information from you via forms. The exact information we need to collect (including Personal Information) will depend on the purpose of the form. For example, if you use the form on our “Contact Us” page, we collect your name, email address, and message. We will indicate on the form whether a particular field of information is mandatory or optional. If you choose not to provide certain information, we may not be able to provide requested services.
B. Information We Automatically Collect from You
We collect the following types of information automatically through your use of the Site:
- Cookies, Device Identifiers, and Similar technologies
Most browsers provide you with the ability to block, delete, or disable cookies, and your mobile device may allow you to disable transmission of unique identifiers and location data. If you choose to reject cookies or block device identifiers, some features of the Site may not be available or some functionality may be limited or unavailable. Please review the help pages of your browser or mobile device for assistance with changing your settings.
To assist us with analyzing our website traffic through cookies and similar technologies, we use analytics services, including Google Analytics. For more information on Google Analytics’ processing of your information, please see “How Google uses data when you use our partners' sites or apps.”
When you use our Site, our servers automatically record information, including your Internet Protocol address (“IP Address”), browser type, referring URLs (e.g., the site you visited before coming to our Site), domain names associated with your internet service provider, information on your interaction with the Site, and other such information (collectively, “Log File Information”). We may also collect similar information from emails sent to you which then help us track which emails are opened and which links are clicked by recipients.
We use Log File Information collected from our implementation of the Site to help secure the Site by identifying potential threats and vulnerabilities and in analyzing the effectiveness of our Site to improve the Site’s function and content.