When you visit the UST India Web site, you do
so anonymously - there is no need to tell us who you are. If
you direct an enquiry to any of our department, we will ask you to
provide your name and mailing address or e-mail address for
the purpose of responding to your enquiry. Only those who
"need to know" will have access to the personal information
Encryption technology protects personal
information during transmission. A notice stating "you are in
a secure site" will be posted on web sites when you are in an
encrypted session. A security icon will also appear in either
the lower left corner or, depending on your browser, the lower
right corner of your browser window. Secure pages are not
saved in temporary caches on a computer. Once you exit secure
screens, those screens cannot be accessed again. If encryption
is not available through a site, an alternative means of
communication will be recommended.
The Web server does not collect or retain
your e-mail address in a database format although some
Internet Service Providers may automatically include your
e-mail address with your IP address (Internet Protocol).
UST India Web Site where personal information is
requested will contain a notice outlining our legal authority
to collect it and include the following information:
the purpose for collecting the personal information;
Personal information is only disposed of according to a records retention schedule.
To ensure personal information is unrecoverable, a utility program is used to remove
the electronic data and any paper records generated are shredded.
how it will be used and who will have access to it;
who to contact if you have any questions about these practices.
The UST India Web site logs requests to the web server. These logs record the IP address of site
visitors. An IP address is the number automatically assigned
to the computer or to the ISP (Internet Service Provider)
requesting a URL.
Logged information, is recorded in non-identifiable form and
is used by staff or those under contract for Web site
system administration. Log files are archived and used for
systems analysis, maintenance and site evaluation.