Site and Server log files
We collect data and HTTP protocol elements through access logs. This is standard with any web server, is not personally identifiable, and is used for Web site development and system administration. The type of information collected includes browser type, IP address, date and time of visit, where you came from, where you went and what you downloaded while visiting the site. The information is stored on a secure server, and in a password-protected database.
Email contact form
Your email address will only be used in relation to the matter you write to us about. It will not be sold, rented/leased to or otherwise given to others without your express permission - unless required to by law. Due to the nature of email, sending information via the internet remains entirely at your own risk, and we will not be responsible for any unauthorized interception, use and disclosure of this information. We use a mail-form as it affords some protection against spam bots and malicious users, but please be aware that it records your IP address in addition to the details you provide.
Your email address will not be sold, rented/leased to or otherwise given to others without your express permission - unless required to by law. When you subscribe to our newsletter - we only use your email address to send you our site newsletter.
Site membership details
Minimal personal details are required for site membership, and those that are required are stored in a secure database with encrypted password protection. We do not collect or store financial information such as credit card details. All financial transactions for site membership are conducted by PayPal, so it is recommended you review their privacy and security policies too.
Any pop-up ads responsible for cookies when visiting this site are time-delayed exit consoles associated with the previous site you visited, or have been triggered by browser enhancements such as HotBar.
Other security measures
The software used to run this site is kept updated and patched for any security weaknesses identified. Of course, this is no guarantee against malicious hackers.