Like many other Web sites, we make use of log files. These files merely logs visitors to the site - usually a standard procedure for hosting companies and a part of hosting services' analytics. The information inside the log files includes internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and possibly the number of clicks. This information is used to analyze trends, administer the site, track user's movement around the site, and gather demographic information. IP addresses and other such information are not linked to any information that is personally identifiable.
We believe it is important to provide added protection for children online. We encourage parents and guardians to spend time online with their children to observe, participate in and/or monitor and guide their online activity. We do not knowingly collect any personally identifiable information from children under the age of 13. If a parent or guardian believes that we have in our database the personally-identifiable information of a child under the age of 13, please contact us immediately (using the contact in the first paragraph) and we will use our best efforts to promptly remove such information from our records.
If You Send Us Personal Information
We will only collect personal information which you knowingly and voluntarily provide by, for example, sending emails, registering for events or other programs, or responding to surveys. We will never share your name or information outside the Foundation unless you affirmatively authorize us to do so by opting-in.
When we send you such information by email, you will always have an immediate opportunity to decline further communication. Please use the contact specified in the email so that we can remove you from the list that contains your name.
The Foundation uses outside vendors to provide certain services on our behalf, such as companies who conduct customer satisfaction surveys on our behalf or who process credit card transactions for us. These third-party vendors will have access to the information needed to perform their functions, but may not use your information for any other purpose.