SECURITY AND INTEGRITY OF INFORMATION
We treat our data as assets that must be protected against loss and unauthorized access. We employ information security techniques to appropriately protect confidential information from unauthorized access by users inside and outside the company. Access to customer information is limited to those employees who have a legitimate business need for that information.
RETENTION OF CUSTOMER INFORMATION
We retain information about customers as necessary for business purposes and as required by government regulation. We carefully dispose of records and delete information when retention periods expire.
CECPD WEB SITE
The following paragraphs describe our commitment to the protection of personal information as it applies to the CECPD Web site.
What Information We Collect and How We Will Use It:
Users can visit most areas of this Web site without revealing who they are or providing any information about themselves. However, some of our interactive services require that users identify themselves in order to enable the interactive function. We may ask users to provide some personal information in these situations.
From time to time, we include survey forms on our Web site asking users for contact and demographic information (such as postal code, address, phone). We use the responses from the surveys to better understand our customer's needs and to create Web sites that respond to their interests. Participants in the survey may, if they choose, provide personal information that will be used to keep them informed of CECPD e-business solutions and enhancements. Participants receiving these updates will be able to 'unsubscribe' by following instructions included with the update. CECPD will not disclose survey response information to companies or individuals outside CECPD with two exceptions:
The DHS Web site collects IP addresses for system administration, security, and statistical analysis purposes. An IP address is a number that is automatically assigned to a computer whenever it is connected to the Internet. We log these addresses and analyze them to understand where requests originate so that we can provide the most efficient service, enhance security, ensure appropriate usage and produce traffic volume statistics.