CPWR — The Center for Construction Research and Training (CPWR) recognizes the importance of protecting the privacy of visitors to our websites, as well as those who request information or advice from CPWR.
What Information Do We Collect?
When you visit our websites, you may provide us with two types of information: personal information you knowingly choose to disclose, which is collected on an individual basis, and website use information collected on an aggregate basis as you and others browse our websites.
- Personal Information You Choose to Provide
You are not required to provide any personal information to use any of our websites. However, if you choose to access some of our services, we require and retain basic information: If you wish to receive our communications, ask questions, request assistance or submit information to be posted on one of our websites, we ask for your name and/or mailing or email address. On websites that provide the opportunity to create exposure control plans, you may elect to register in order to save, retrieve and/or edit your plan, and if you do so, we ask for an email address. In each of these instances, we retain the name, email and/or mailing addresses voluntarily provided, along with the content of email inquiries and communications and our response. On occasion, we refer technology issues to our third-party website developer, who may contact you, and we may contact individuals who contact us to solicit volunteers for research initiatives. We do not otherwise use the information for any purpose other than that for which you provide it nor share the information with any third parties.
You can manage your profile and email preferences, including “opting out” of email by contacting us using the Contact Us page.
- Website Use Information
To fulfill government grant guidelines and to track usage of our websites, a CPWR website may utilize a standard technology called “cookies” (see explanation below, “What Are Cookies?”) and Web server logs. Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our website, and the websites visited just before and just after our website. The information collected in this manner does not include your name, your email address, or other identifying information.
What Are Cookies?
How Do We Use Information We Collect from Cookies?
In no case do we disclose, give, sell or transfer any personal information about Site visitors, except as described in “Certain Disclosures” below.
How Do We Protect Your Information?
We implement commercially reasonable security measures to help protect against unauthorized access to or unauthorized alteration, disclosure, or destruction of data. We restrict access to personal data to certain companies who need the data to operate, develop, or improve our services. These individuals or partner organizations are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
How Do We Secure Information Transmissions?
Email is not recognized as a secure medium of communication. For this reason, we request that you do not send private information to us by email. Some of the information you may enter on our websites may be transmitted securely via Secure Sockets Layer SSL, 256-bit encryption services. Pages utilizing this technology will have URLs that start with HTTPS instead of HTTP.
How Can You Delete Your Information?
You can request, at any time, that we delete your personal data. All requests must be submitted through our Site’s Contact Us page. When we delete your personal data, it will be removed from our active databases or anonymized so that the data is no longer identified with you, but the data may remain in our archives if we determine that it is not practical or possible to delete it.
We may disclose your personal information if required to do so by law or subpoena or if we believe that such action is necessary to (a) conform to the law or comply with legal process served on us or affiliated parties; (b) protect and defend our rights and property, our sites, the users of our sites, and/or our affiliated parties; or (c) act under circumstances to protect the safety of users of our sites, us, or third parties.
What About Other Websites Linked to Our Websites?
Our websites contain links to many other websites. We are not responsible for the practices employed by websites linked to or from our websites nor the information or content contained therein.
In the event we determine the occurrence of a data security incident, we will notify you by email, US mail, telephone, or other means as permitted by law.