What We Collect and How We Use It…
When you visit www.jessie.org we may send one or more cookies to your computer, so that we may uniquely identify your browser (a cookie is simply a tiny text le containing a string of characters). Accepting our cookies allows you to keep your user preferences from session to session. Although most browsers accept cookies by default, you can set your browser to refuse all cookies, or to tell you when you’re being sent a cookie. Some www.jessie.org features and services may not func- tion properly if you have cookies disabled.
Log information. When you use Jessie Rees Foundation services, our servers automatically record information that your browser sends when you visit one of our websites. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request, and one or more cookies that may uniquely identify your browser.
How Do We Use Your Information?
When you sign up for a particular service that requires registration, we ask you to provide personal information. You may decline to submit personal information to any of our services, in which case Jessie Rees Foundation may not be able to provide those services to you. Your email address is only used for current and future Jessie Rees Foundation program com- munications you’ve opted-in to receive. We never sell, share, or spam.
How Do We Share Your Information?
Jessie Rees Foundation does not share your personal information with other institutions outside of Jessie Rees Foundation. However, Jessie Rees Foundation may share your personal information if we have a good faith belief that access, use, pres- ervation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms Of Service, including investigation of potential viola- tions thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against imminent harm to the rights, property or safety of Jessie Rees Foundation, its users or the public as required or permitted by law.
Jessie Rees Foundation takes commercially reasonable steps to implement appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These steps may include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data. We restrict access to personal information to Jessie Rees Foundation employees, contractors and agents who need to know that information to operate, develop or improve our services. These individuals are bound by con dentiality obligations and may be subject to disci- pline, including termination and criminal prosecution, if they fail to meet these obligations. Jessie Rees Foundation is not responsible, however, if unauthorized access to information occurs.
We review our data collection, storage and processing practices to ensure that we only collect, store and process the personal information needed to provide or improve our services. We take reasonable steps to ensure that the personal information we process is accurate, complete, and current, but we depend on our users to update or correct their personal information whenever necessary.