WHAT INFORMATION IS Neumann Smith Architects GATHERING ABOUT ITS VISITORS AND HOW IS IT BEING USED?
Every computer connected to the Internet is provided with a domain name (e.g. yourdomain.com) and an IP Address (e.g. 18.104.22.168). When a visitor requests a page from within the Neumann Smith Architects site, our Web Servers automatically identify and log the HTTP request that is made to our Web Server. This information reveals nothing personal about you. In fact, the only information that we automatically gather and log is as follows:
The IP Address of the Site that may have Referred you.
Your IP Address.
The Web Page that you may have linked to us from, if any.
The Product Identifier for Version and Make of Browser (e.g. Internet Explorer 9.0)
The Operating System platform that you may be running (e.g. Macintosh or Windows)
Search Words or Terms that are passed from a Search Engine (e.g. Google, Yahoo, or Bing)
There is absolutely nothing special about the information just described, and the practice of collecting this data has been generally standardized by virtually every Web Server on the Internet today.
The purpose for this information is actually two-fold. One, Neumann Smith Architects has found it advantageous to examine visitor traffic in its aggregate, so that we can ensure maximum compatibility for the various Browsers and Operating Systems that visit our site. Additionally, as any business should attest, it is our desire to generate greater amounts of visitor traffic. By analyzing visitation patterns, referring URLs and Search Engine terms, we can strategically enhance our exposure on the Internet.
WHAT ABOUT COOKIES?
Cookies are small pieces of data that are transferred to your computer’s hard drive through your Web browser from our Web Server. A cookie cannot read data from your hard disk or read cookie files that may have been created from other sites. The Neumann Smith Architects website utilizes cookies as a means of providing personalisation features to our visitors. For example, we utilize cookies to remember settings (background music selections, wallpapers preferences, etc.) that you may have made at our website.
You can choose whether to accept cookies by changing the settings of your browser. Typically, by accessing the browser’s help feature you can obtain information on how to prevent your browser from accepting all cookies or to notify you when a cookie is being sent. If you choose not to accept these cookies, your experience at our website and other websites may be diminished and some features may not work as intended.
WHAT OTHER INFORMATION DOES Neumann Smith Architects REQUEST?
We may also request your e-mail address or mailing address for the purposes of conducting a survey, adding you to our mailing list, or by your request to have someone contact you for additional information. Whenever we request the identity of a visitor, we will clearly indicate the purpose of the inquiry before the information is requested. We maintain a strict “No Spam” policy that means we do not intend to sell, rent, or otherwise give your e-mail address to a third-party, without your consent.
In addition, Neumann Smith Architects will not send you e-mail that you have not agreed to receive. If you are a member of our Mailing List, you will be contacted with announcements, news, portfolio additions, and new products or services. You have the option of “Unsubscribing” from out Mailing List at any time, thereby disabling any further such e-mail communication from being sent to you. If you wish to have specific communications with a member of the Neumann Smith Architects staff, you will be required to provide specific information that will be routed to the appropriate contact within Neumann Smith Architects.
WILL Neumann Smith Architects DISCLOSE THE INFORMATION COLLECTED TO THIRD PARTIES?
Neumann Smith Architects will disclose your personal information or any of its log file information when required by law or in the good-faith belief that such actions are necessary to:
Conform to the edicts of the law or comply with a legal process served on Neumann Smith Architects.
Protect and defend the rights or property of Neumann Smith Architects, or visitors of Neumann Smith Architects.
Identify persons who may be violating the law, the legal notice, or the rights of third parties.
Cooperate with the investigations of purported unlawful activities. Neumann Smith Architects uses reasonable precautions to keep the information disclosed to us secure.
ACCURACY / ACCESS
You may access and update the personal information we provide to the registries in respect of your domain name licence at any time. In addition, as a customer, you can access and change any of the data we hold to describe your services through our client portal at any time.
If you believe that Neumann Smith Architects may hold other personal information about you that is inaccurate, or you wish to change or update any of the personal information you have provided, please email us.
The transfer of information across any media may involve a certain degree of risk, and the Internet is no different. However, helping you to keep your information secure is very important to Neumann Smith Architects.
At Neumann Smith Architects we treat your data with the utmost security and use a range of technologies and policies including firewalls and access controls and restrictions to ensure that your data is secured not only from access and visibility but also from unauthorised alteration or erasure.
You can also use simple precautions to help protect your security, such as protecting against the unauthorised use of your username or password or other authentication ID.
NOTIFIABLE DATA BREACH
From 22 February 2018, a data breach that is likely to result in serious harm to individuals must be reported to those affected and also to the Office of the Australian Information Commissioner (OAIC). A data breach happens when personal information is accessed or released without authorisation, or is lost. Serious harm may include physical, financial, emotional, psychological or reputational harm. We have procedures in place to ensure that a data breach is properly identified, assessed, contained and reported if necessary.