PovertyFrontiers
 
PovertyFrontiers.org is your knowledge sharing resource on poverty reduction, asset-based approaches to development, and poverty-related issues.
 
Privacy Policy for PovertyFrontiers
We collect no personal information about you when you visit our website unless you choose to provide this information to us. However, we collect and store certain information automatically. Here is how we handle information about your visit to our website.
 
What We Collect and Store Automatically
If you do nothing during your visit but browse through the website, read pages, or download information, we will gather and store certain information about your visit automatically. This information does not identify you personally. We automatically collect and store only the following information about your visit:
1. The IP address (an IP address is a number that is assigned to each computer connected to the Internet) from which you access our website;
2. The type of browser and operating system used to access our site;
3. The date and time you access our site;
4. The pages you visit; and
5. If you linked to our website from another website, the address of that website.
We use the information we collect to count the number and type of visitors to the different pages on our site, and to help us make our site more useful to visitors like you.
 
If You Choose to Provide Personal Information
You may choose to provide us with personal information on this website, including name, organization, and e-mail. This information is collected only if specifically and knowingly provided by you. Personally identifying information you provide will be used by PASSN only in connection with this Community of Practice or for such other purposes as are described at the point of collection. We do not give, sell or transfer any personal information to a third party.
This website uses personal information for four purposes:
1. If you choose, you may have new information from this Community of Practice site sent to your email address. This subscription service is optional and may be turned off at any time by editing your profile in the "My Preferences" section.
2. If you choose, you may indicate your name, organization, and/or email address when you submit discussion items and comments to documents on this site. If you do submit this information, it will be displayed publicly on this site along with your discussion or comments.
3. PASSN designed this site to maximize participation of multiple parties in the Community of Practice. If you choose to submit your email address on this site, PASSN may contact you via email regarding this planning process, including notifications of public meetings, follow-up surveys, and other forms of outreach. If you would not like to be contacted, please notify the site administrator at feedback@qedgroupllc.com.
 
If You Send Us E-mail
You may choose to provide us with personal information as an e-mail with a comment or question. We use the information to improve our service to you or to respond to your request. Sometimes we forward your e-mail to other government employees who may be better able to help you. Except for authorized law enforcement investigations, we do not share our e-mail with any other outside organizations.
 
Use of Cookies or Other Tracking Devices
A "persistent cookie" is a small text file that is stored on your computer and makes it easy for you to move around a Web site without having to continually re-enter your name, password, preferences, etc. Our website does not use persistent cookies.  A “session cookie” is a small text file that is not stored on your computer, but is kept in memory while you are connected to our Web site and is erased when you close your browser.  We use session cookies only to make your visit more productive for you.
 
Securing the Information We Collect Online
We are committed to properly securing the information we collect online. To help us accomplish this, we take the following steps:
1. We employ internal access controls to ensure that only people who see your information are those with a need to do so to perform their official duties;
2. We train relevant personnel on our privacy and security measures so that our personnel know what is required for our compliance;
3. We regularly back up the information we collect online to insure against loss;
4. We use technical controls to secure the information we collect online, including: encryption, firewalls, password protections, etc.;
5. We periodically test our security procedures to ensure personnel and technical compliance; and
6. We employ external access safeguards to identify and prevent unauthorized attempts or outsiders to hack into, or cause harm to, the information in our systems.
Tampering with this web site is against the law. If anyone tries to tamper with it, they may be punished under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
 
Links to Other Sites
Our website has links to a limited number of public and private organizations. When you link to another site, you are no longer on this site and are subject to the privacy policy of the new site.


 

SEARCH

Google Custom Search

DOCUMENTS & PRODUCTS

CONTACT US

Questions? Comments? Send us your feedback or content for posting.