- We may change or modify this Policy at any time with or without notice to our users. All changes to this Policy will be posted in this Policy.
- We may collect general usage statistics about users or readers and their machines including, but not limited to, the number of times a given page is visited each day and the number of times a given search query is executed. These statistics are not used to identify users uniquely and are aggregated to discover overall usage trends.
- We may record uniquely identifiable information about your computer and/or place or recognize cookies on your computer when you respond to an online survey. This information is only used to prevent you from responding to a survey multiple times and is never used to identify your unique response(s) to a survey question.
- We may place or recognize cookies on your computer to track usage and to track advertising. (See cookies and Google Analytics)
- Cookies Our Web applications serve ads when you visit The Eagle Online. Our applications may place or recognize cookies on your computer.
- We may use information (not including your name, address, e-mail address or telephone number) about your visits to this and other sites in order to provide advertisements about goods and services that may be of interest to you. Specifically, we may track which ads are displayed on the pages you visit and whether you click on them.
- In addition, we may share Web site usage information about visitors to our site with an advertiser or advertising agency for the purpose of managing and targeting advertisements and for market research analysis on our site and other sites.
- For these purposes, we may note all or some of the pages you visit on our site, by tracking your computer’s IP address and other information about your system (not including your name, address, e-mail address or telephone number).
- Mailing Lists
- Your e-mail address is used to send you information that you requested. We never sell, rent or loan our e-mail lists to outside firms.
- We may include paid advertisements in the e-mail in order to support this service, but we will never only send you advertising and we will never provide your name or e-mail address to any advertisers.
- You may always remove yourself from a list to which you have subscribed by unsubscribing in your account preferences.
- We may determine that a certain user or group of users is abusing our Web service and we may use the information collected in our Web logs to determine our best approach to handling such abuse. Information regarding these decisions will not be sold or rented, but may be shared with outside agencies or the Information Technologies Department (http://it.ceu.edu/) and administration at USU Eastern for security purposes.
- E-mail and network security
“Unsolicited” means that the recipient has not granted verifiable permission for the message to be sent.
“Bulk” means that the message is sent as part of a larger collection of messages, all having substantively identical content.
“Spam” means the message that is both Unsolicited and Bulk.
- The Eagle Online does not support nor tolerate sending of Spam and supports measures to eliminate or reduce the sending of unsolicited bulk e-mail.
- The Eagle Online may filter our e-mail against realtime blacklists (“RBLs”). We may block e-mail traffic from senders been listed on one of our selected lists or other RBLs designated by us and/or the Information Technologies Department (http://it.ceu.edu/) at USU Eastern.
- If we have reason to believe you or your company is in violation of our e-mail policy, we may report incidents to agencies including, but not limited to your ISP, your system administrator or chief information officer, any and all anti-spam databases, reporting systems and consumer advocacy groups. Repeated violations of this policy may be considered as harassment and may be prosecuted under applicable law.
- The Eagle does not send spam to our users. Please report all incidents to: firstname.lastname@example.org. If possible, include the full text of the e-mail, including the full header.
- Security Scanning
- The Eagle may scan incoming messages; any files sent over ftp, smtp, http or other protocols; and disks and other media submitted to The Eagle for computer viruses, trojans, spyware, phishing, bots, macros and other threats to our computer systems and users.
- These messages and data may be read by a third party in transit, which may or may not abide by this Policy. All information from security scans is logged on our servers. We will not rent or sell any personally identifying information contained in these logs. However, information gained in a security scan indicating a threat to our computer systems may be shared with outside agencies or other departments at the College of Eastern Utah for security purposes.
- Messages, files or media determined to be infected with a virus or other security threat will be promptly quarantined, destroyed or removed from or by our systems. Recipients and/or senders may be notified that actions were taken by our system, but we may not notify senders and/or recipients in all cases.
Posted May 23, 2010, 11:25 am
Last updated March 5, 2012, 1:33 am