Privacy and Security Notice
Thank you for visiting Treating-Cancer-Alternatively
(TCA). This notice informs you how we will handle information we learn about you from your visit to our site. Additionally, this notice informs you that TCA does not monitor network traffic.
Your Rights under the Privacy Act: The Privacy Act of 1974 protects the personal information
a company can keep on you in “systems of records (SOR)” (information that can be retrieved by name or some other personal identifier). The Privacy Act regulates how
a company can disclose, share, provide access to, and maintain the personal information that it collects. Not all information collected online is covered by the Privacy Act.
The Act’s major provisions require agencies to:
- publish a Privacy Act Notice in the Federal Register explaining the existence, character and uses of a new or revised SOR;
- keep information about you accurate, relevant, timely, and complete to assure fairness in dealing with you; and
- allow you to, upon request, access and review your information held in a SOR and request amendment of the information if you disagree with it.
Your viewing of TCA’s website does not result in the collection of any personal information that is contained in a Privacy Act System of Records as defined by the Privacy Act.
Children’s Privacy: Most TCA Web pages provide content to
adults, although some of the information is applicable to
treating children. It is TCA policy, in compliance with the requirements of the Children's Online Privacy Protection Act (COPPA),
not to collect information online about or from children of
any age except when it is needed to identify a submission or
to answer a question. We do not know the age of any person
accessing TCA, filling in a request for information, or
sending us a comment. Testimonies will be stated as
from a person as (e.g., Mike, Kentucky).
TCA and Privacy: Please be assured that the privacy of our visitors is of utmost importance to us. We collect no personally identifiable information about you when you visit our site unless you choose to provide that information to us.
We want to inform you that, for each HTTP request (which is what your Web browser generates when you request a page or part of a page from a Web site) received, we collect
no information or store it in any log files.
Cookies: TCA does not use "persistent cookies" or any other persistent tracking methods to collect personally identifiable information about visitors to our Web pages. However, some
TCA pages have “session cookies,” to facilitate use of that particular page. These disappear when the Web user terminates a Web session and closes the browser.
Cookies are small files that Web servers place on a user's hard drive. They can serve several functions, depending upon how they are designed:
- they allow the Web site to identify you as a previous visitor each time you access a site;
- they track what information you view at a site (important to commercial sites trying to determine your buying preferences);
- in the more advanced cases they track your movements through many Web sites but not the whole Web;
- businesses use them for customer convenience to allow them to produce a list of items to buy and pay for them all at one time and to garner information about what individuals are buying at their sites;
- advertisers use them to determine the effectiveness of their marketing and offer insights into consumer preferences and tastes by collecting data from many Web sites; and
- they can be used to help a Web site tailor screens for each customer's preference.
Other Information Collection:
TCA offices may collect other information from online visitors. Before collecting personally identifiable information through our Web pages, we will prominently disclose:
- why TCA is collecting the information;
- what information is to be collected;
- the intended use of the information;
- how it will be protected/secured;
- if it will be shared within or outside TCA, including on publicly available Web sites;
- if shared, with whom;
- the opportunity to consent to, or reject, the collection and/or sharing, and
- when it will be destroyed.
How the Information is Used: We may store non-personally identifiable information we collect, to help us better understand and meet the needs of our visitors. We may share non-personally identifiable information with others, including the public, in aggregated form (for instance, in a list of our most popular search engine queries), in partial or edited form (such as in a report summarizing responses to a questionnaire), or verbatim (for example, in a complete listing of survey responses).
How e-mail is Handled: By sending us an electronic mail message (for example, an e-mail message containing an official Freedom of Information Act request), you may be sending us personally-identifying information, such as name and address. In these cases, we may retain the information as long as necessary to respond to your request or otherwise resolve the subject matter of your e-mail. Please be aware that email is not necessarily secure from 3rd party interception or misdirection. For your own protection you may wish to communicate sensitive information using a method other than email.
Personal Information via Forms: Some of our pages provide forms allowing visitors to submit search engine queries, questionnaires, feedback, or other information. Some of these forms may request personally identifiable information (e.g., name, address, e-mail address) for specific purposes, such as when the submitter is requesting a personal response, registering for a conference, or subscribing to a mailing list. All information submitted by visitors is voluntary.
For site security purposes and to ensure that this service remains available to all users,
TCA employs monitors and filters to identify and block unauthorized attempts to upload or change information, or otherwise cause damage to the information on our Web pages. Unauthorized attempts to upload or change information on this site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act. Except for these authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits.
Return to Home