Our web server automatically records certain information incidental to your use of our website such as; the name of your IP address of the computer you are using, the type of browser software and operating system that you use, and other similar information. Information regarding your visit and traffic pattern may be aggregated to compile a web transaction report showing us this web traffic-related information.
Use of Information Collected
The personal information collected is used to respond to your inquiries and to send you literatures that you request. The information collected is also used to help us to maintain and upgrade the quality of our website and the services that we provide on the website. We will not disclose, sell, or provide such information to unaffiliated third parties; however, we may provide such information to our subsidiaries. We reserve the right to provide such information to our officers, employees, contractors, agents, and designees to the extent necessary to enable them to execute certain web services (such as web hosting or maintenance services) for us. We also reserve the right to disclose such information to any third party if we believe that we are required to do so for any or all of the following: (i) by law; (ii) to comply with legal processes or governmental requests; (iii) to prevent, investigate, detect or prosecute criminal offences or attacks on the technical integrity of the web site or our network; and/or (iv) to protect the rights, property, or safety of MAJOR SCIENCE, the users of the website, or the public.
Modifying or Deleting Your Personal Information
If you wish to modify your personal information, discontinue receiving materials from us, or remove your personal information from Major Science's database, you may do so at the Contact Us page of our website. You may also contact us at firstname.lastname@example.org perform this request.
While major science cannot guarantee that unauthorized access will never occur, rest assured that major science takes great care in maintaining the security of your personal information and in preventing unauthorized access to it through the use of appropriate technology and internal procedures