Thank you for visiting the Zircon Corporation Web site.
This policy establishes how we will handle information we learn about you from your visit to our site. Please be assured that the privacy of our visitors is of utmost importance to us.
We collect no personally identifiable information about you when you visit our site unless you choose to provide that information to us.
The specific practices outlined in this privacy statement apply to Web sites maintained by or on behalf of Zircon Corporation.
Some of our Web pages contain links to Web sites outside Zircon Corporation, including those of other private organizations. Please be aware that when you follow a link to another site, you are then subject to the privacy policies of the new site.
Your Rights under the Privacy Act: Information concerning the Privacy Act can be found on the following Web site: http://www.cftc.gov/foia/foiprivacyact.htm
Automatic Collections: For each HTTP (which is what your Web browser generates when you request a page or part of a page from a Web site) request received, we collect and store only the following information:
- The date and time
- The originating IP address
- The type of browser and operating system used (if provided by the browser)
- The URL of the referring page (if provided by the browser)
- The object requested
- Completion status of the request
- Pages visited
How the Information is Used: We use the information that we collect to measure the number of visitors to the different areas of our sites, and to help us make our sites more useful to visitors. This includes analyzing these logs periodically to determine the traffic through our servers, the number of pages served, and the level of demand for pages and topics of interest.
How Long is the Information Retained: The logs may be preserved indefinitely and used at any time and in any way necessary to prevent security breaches and to insure the integrity of the data on our servers.
Privacy Act System of Records: Zircon Corporation Web site does not maintain any Privacy Act System of Records (PASOR) as defined by the Privacy Act.
Cookies: Zircon Corporation does not use "persistent cookies" or any other persistent tracking methods to collect personally identifiable information about visitors to its Web sites. Cookies are small files that Web servers place on a user's hard drive. They can serve several functions: they allow the Web site to identify you as a previous visitor each time you access a site; they track what information you view at a site (important to commercial sites trying to determine your buying preferences); in the more advanced cases they track your movements through many Web sites but not the whole Web; businesses use them for customer convenience to allow them to produce a list of items to buy and pay for them all at one time and to garner information about what individuals are buying at their sites; advertisers use them to determine the effectiveness of their marketing and offer insights into consumer preferences and tastes by collecting data from many Web sites; and they can be used to help a Web site tailor screens for each customer's preference.
Personal Information via Forms: Our site provides forms allowing visitors to submit search engine queries, questionnaires, feedback, or other information. Some of these forms may request personally identifiable information (e.g., name, address, e-mail address) for specific purposes, such as when the submitter is requesting a personal response, registering for a product, or submitting a support request.
All information submitted by visitors is voluntary. We may store non-personally identifiable information we collect (such as search engine queries) indefinitely to help us better understand and meet the needs of our visitors. We may share non-personally identifiable information with others, including the public, in aggregated form (for instance, in a list of our most popular search engine queries), in partial or edited form (such as in a report summarizing responses to a questionnaire), or verbatim (for example, in a complete listing of survey responses).Before collecting personally identifiable information, we will prominently disclose:
- why we are requesting the information;
- how it will be used;
- how long it may be retained; and
- under what conditions, and with whom, it may be shared.
Consent to Information Collection /Sharing: Generally, we will not share any personally identifiable information you give us with any other organization, or the public, except with your consent or as required by law.
By pressing the "submit" button, each visitor consents to the use of the information the visitor provides for purposes stated in this policy.
How e-mail is Handled: By sending us an electronic mail message, you may be sending us personally-identifying information. In these cases, we may retain the information as long as necessary to respond to your request or otherwise resolve the subject matter of your e-mail. Please be aware that email is not necessarily secure from interception or misdirection. For your own protection you may wish to communicate sensitive information using a method other than email.
Information Protection: We want to be very clear: regardless of the information being transmitted to Zircon Corporation, we will protect all such information consistent with applicable law including, but not limited to, the Privacy Act of 1974 and the Freedom of Information Act.
For site security purposes and to ensure that this service remains available to all users, Zircon Corporation's computer systems employ software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage to the information on our Web sites. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. For example, if a breach of our IT security protections were to occur, the information collected by our servers and staff could be shared with appropriate law enforcement and Homeland Security officials.