We are firmly committed to respect the privacy of our
clients and web site visitors. We think it is important to be very clear
about the information we collect and how we use it.
Any and all personal information collected at this site will be kept strictly confidential and will not be sold, reused, rented, loaned, or otherwise disclosed. Any information you give us will be held with the utmost care, and will not be used in ways you have not consented to. A more detailed explanation about how we safeguard your personal information is described below.
We do not sell, rent, loan, trade or release any personal information collected at our site, including software registration forms or e-mail lists. We will not under any circumstances pass on your e-mail address to other companies! We do not support unsolicited commercial e-mail! And you can always "recall your information" from us and "opt out" of receiving future communication from us. We will promptly delete your details from our database, as outlined in the next section.
We will not put your e-mail address in a database unless you signup to our newsletter or we do business with you. Our site provides you with the option to opt-out of receiving communications from us and from our partners at any time. Just contact us and tell us that you don't wish to receive any future communications from us.
Browser information collected on the website and server logs
Like most web sites, we keep server logs of accesses to the site. These logs are used internally to determine what sections of our site are being accessed so that we may improve our site. Our website logs are not personally identifiable, and we make no attempt to link them with individuals that actually browse the site.
Privacy of e-mail lists
We maintain a news lists to keep our members informed about breaking events, product developments and updates. We do not sell, rent, loan, trade or lease the addresses on our list to anyone.
This site has security measures in place to protect the loss, misuse, and alteration of the information under our control. These measures may include but are not limited to data encryption, packet filtering, password-based access controls, and the use of anti theft devices.