Here is how we handle information about your visit to our website:
If you do nothing during your visit but browse through the website, read pages, or download information, our web servers will gather and store certain information about your visit automatically. This information does not identify you personally. We automatically collect and store only the following information about your visit:
We use this information to help us make our site more useful to visitors – to learn about the number of visitors to our site and the types of technology our visitors are using. We do not track or record information about individuals and their visits.
If you choose to provide us with personal information, as in an e-mail or by filling out a form with your personal information and submitting it to us through our website, we use that information to respond to your message and to help us locate for you the information you have requested. We do not create individual profiles with the information you provide.
We occasionally use email addresses submitted on our web site to contact people regarding their opinions or to bring items to their attention that we believe will be of interest to them. In addition, we occasionally make our email list available to outside companies which have products or services we think we be of interest to you. If you do not wish to receive email from other companies, please sends us a email telling us not to share your name, or make that choice on our information forms.
Information presented on the CyberEdge Information Services' website is considered private information and may not be distributed or copied. All information on this site is copyright © CyberEdge Information Services or other owner as indicated. No copying, distribution, publication, modification or other use of material found here is permitted without prior authorization from CyberEdge Information Services.
For site security purposes and to ensure that this service remains available to all users, this computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes.
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986.
If you have any comments or questions about the information presented here please forward them to webmaster at cyberedge.pro.
© 2019 CyberEdge Information Services, Inc.