Passive Information Collection
As you navigate through a Web site, certain information can be passively collected (that is, gathered without your actively providing the information) using various technologies and means, such as Internet Protocol addresses, cookies, Internet tags, and navigational data collection.
An “IP Address” is a number assigned to your computer by your Internet service provider so you can access the Internet and is generally considered to be non-personally identifiable information, because in most cases an IP address is dynamic (changing each time you connect to the Internet), rather than static (unique to a particular user’s computer). We use your IP address to diagnose problems with our server, report aggregate information, determine the fastest route for your computer to use in connecting to our site, and administer and improve the site. This site uses IP Addresses.
A “cookie” is a bit of information that a Web site sends to your Web browser that helps the site remember information about you and your preferences.
“Session” cookies are temporary bits of information that are erased once you exit your Web browser window or otherwise turn your computer off. Session cookies are used to improve navigation on Web sites and to collect aggregate statistical information. This site uses session cookies.
“Persistent” cookies are small bits of data that are saved on your computer and used to restore your preferences or to identify your computer to the web server during return visits to the Web site. This site uses persistent cookies to store your choice of edition for next time.
“Internet tags” (also known as single-pixel GIFs, clear GIFs, invisible GIFs, and 1-by-1 GIFs) are not stored on the visitor’s computer. They tell the Web site server information such as the IP address and browser type and computer platform in use by the visitor. This site does not use Internet tags.
“Navigational data” (“log files,” “server logs,” and “clickstream” data) are used for system management, to improve the content of the site, for market research purposes, and to communicate information to visitors. This site uses navigational data.
You may provide your Personal Information (email, address, etc), which we may store. We use Personal Information to provide information to you, (i.e., when you request a paper copy of The Guide).
Content and Ratings
You can publish reviews, comments and other content. You can choose to trust other users of the site. We may allow you to rate companies and/or make other relevant comments.
Your comments and statements are displayed publicly after review by The Good Service Guide. Your name may be changed to initials to protect your privacy.
We may ask for your feedback through a survey, which we treat like other business records.
Other Data Collection
We may get data from or about you in other ways not specifically described in this statement. For example, you might contact a listed firm, or we may get a third party complaint about you. We handle this data like other business records. However, if we tell you elsewhere that specific data is governed by rules that supplement or contradict this statement, those rules trump this statement.
We may use third party contractors who can access our databases. Usually these contractors sign a standard confidentiality agreement. We may use third party service providers who may obtain some of your personal data. Usually we require these providers to use and disclose your personal data only as necessary to perform their services.
Communicating with Other Users
You may not harvest data (including email or mailing addresses) from the site.
If you are 12 and under, please do not use the site or provide any data to us.
Limits on Our Abilities
Our site is very complicated, so we might inadvertently use or disclose your data in ways inconsistent with this statement. For example, a temporary software glitch could lead to public display of your personal data despite your preferences otherwise. We might also make ad hoc uses of your data in ways not mentioned here. In these anomalous situations, your sole remedy is that we will try to rectify the anomaly as soon as we can.
We use industry-standard security protocols, such as (if and where appropriate) firewalls and restrictions on which employees can access user data. However, perfect security does not exist on the Internet. Also, in theory third parties can intercept Internet transmissions containing your personal data, and we don’t control the privacy/security of transmissions to and from the site while in transit.