Page 42 - GIGW2
P. 42

CH 03      Building Confidence









                          Per-session cookies serve technical purposes, like providing seamless navigation
                          through  this  website.  These  cookies  do  not  collect  personal  information  on
                          users and they are deleted as soon as you leave our website. The cookies do not
                          permanently record data and they are not stored on your computer’s hard drive.
                          The cookies are stored in memory and are only available during an active browser
                          session. Again, once you close your browser, the cookie disappears.


                          If you send us personal information:

                          We do not collect personal information for any purpose other than to respond to
                          you (for example, to respond to your questions or provide subscriptions you have
                          chosen). If you choose to provide us with personal information, like filling out a
                          Contact Us form, with an e-mail address or postal address, we use that information
                          to  respond  to  your  message,  and  to  help  you  get  the  information  you  have
                          requested. We only share the information you give us with another Government
                          agency if your question relates to that agency, or as otherwise required by law.

                          Our website never collects information or creates individual profiles for commercial
                          marketing. While you must provide an email address for a localised response to
                          any incoming questions or comments to us, we recommend that you do NOT
                          include any other personal information.


                          Site Security:
                              •  For  site  security  purposes  and  to  ensure  that  this  service  remains
                                 available  to  all  users,  this  Government  computer  system  employs
                                 commercial software programs to monitor network traffic to identify
                                 unauthorised attempts to upload or change information, or otherwise
                                 cause damage.


                              •  Except  for  authorised  law  enforcement  investigations,  no  other
                                 attempts are made to identify individual users or their usage habits.
                                 Raw data logs are used for no other purposes and are scheduled for
                                 regular deletion.

                              •  Unauthorised attempts to upload information or change information
                                 on this service are strictly prohibited and may be punishable under the
                                 Indian IT Act (2000).











     28
   37   38   39   40   41   42   43   44   45   46   47