Don't miss our Oct 5 mtg. with speaker on the Explosion at City Point - with relics!
I. INFORMATION WE COLLECT - We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes only your email, which you submit to us through the registration process on the website.
1. Information Collected via Technology
To activate our services, you do not need to submit any personal information other than your email address. To use the services thereafter, you do not need to submit further Personal Information. However, in an effort to improve the quality of our services, we may track information provided to us by your browser or by our software application when you view or use our service, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to our services, the time and date of access, and other information that does not personally identify you. We track this information using cookies, or small text files that include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal Information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis. HMDC may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, whereas session cookies expire when you close your browser.
III. HOW WE PROTECT INFORMATION - We implement security measures designed to protect your information from unauthorized access. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our services, you acknowledge that you understand and agree to assume these risks.