SECTION A. INTRODUCTION

Thank you for visiting the Adaptive threat website and reviewing our Privacy Notice. This statement addresses the collection, use, security of, and access to information that may be obtained through the use of this website

SECTION B. INFORMATION COLLECTED AND HOW IT IS USED

INFORMATION COLLECTED IF YOU ONLY BROWSE THIS SITE.

If you do nothing during your visit but browse through the website, read pages, or download information, we may gather and store certain information about your visit. This information does not identify you personally. We automatically collect and store the following information about your visit on some of our web pages:

  1. The Internet domain and IP address used to access this site;
  2. Technology information, such as the browser and operating system used;
  3. The date and time;
  4. The pages you visit; and
  5. The website or promotional material that referred you to Adaptive Threat Solution’s website.

If Adaptive Threat Solution uses any of the information it automatically collects, it does so only to improve the content of our web services. Adaptive Threat Solution analyzes this information/the website logs to determine how our website is being used so that we may continually improve the site’s usefulness to the public.

WEB MONITORING AND REPORTING SERVICES.

Adaptive Threat Solution may use persistent cookies in conjunction with third-party service providers, including Google Analytics, to analyze search engine usage and web traffic patterns. This information is used in the aggregate to monitor and enhance our web pages.

WHAT WE COLLECT IF YOU VOLUNTEER INFORMATION.

If during your visit to our website you participate in a survey, send an electronic mail message, or perform some other transaction online, the following additional information will be collected:

  1. The electronic mail address and contents of electronic mail, for those who communicate with us via electronic mail;
  2. Information volunteered in response to a survey; and
  3. Information volunteered through an online form for any other purpose.

The information collected is not limited to text characters and may include audio, video, and graphic information formats that you send us.

We may use electronic mail you send us to respond to you as needed, to address issues you may identify, to further improve our website, or to forward the electronic mail to WSU department or another public agency for appropriate action. Survey information is used for official university business described on survey web pages. Information from other online forms is used for only official university business or for purposes expressly stated on the forms.

SECTION C. PERSONAL INFORMATION AND CHOICE

YOU MAY CHOOSE WHETHER TO PROVIDE PERSONAL INFORMATION ONLINE.

“Personal information” is information about a natural person that is readily identifiable to that specific individual. Personal information includes such things as an individual’s name, address, and telephone number and does not include the users domain name or IP address.

We collect no personal information about you unless you voluntarily provide it to us by sending us electronic mail, participating in a survey, or completing an online form. You may choose not to contact us by electronic mail, participate in a survey, or to provide any personal information using an online form. Your choice not to participate in these activities will not impair your ability to browse Adaptive Threat Solution’s website and read or download information provided on the site.

If personal information is requested on the website or volunteered by the user, state law and the federal Privacy Act of 1974 may protect it. However, this information is a public record once you provide it and may be subject to public inspection and copying if not protected by federal or state law.

If you believe that your personal/private information is being used for a purpose other than what was intended when submitted, you may contact us via email

Users are cautioned that the collection of personal information requested or volunteered by children online or by electronic mail will be treated the same as information given by an adult and may be subject to public access.

SECTION D. PUBLIC ACCESS TO INFORMATION

In the state of Washington, laws exist to ensure that government is open and the public has a right to access appropriate records and information possessed by state government. At the same time, there are exceptions to the public’s right to access public records that serve various needs, including the privacy of individuals. Exceptions are provided by both state and federal laws.

All of the information collected at this site is considered public information and may be subject to inspection and copying by members of the public. RCW 42.17.260(1) states that:

Each agency, in accordance with published rules, shall make available for public inspection and copying all public records, unless the record falls within the specific exemptions of subsection (6) of this section [RCW 42.17.260(6)], RCW 42.17.310, 42.17.315, or other statute which exempts or prohibits disclosure of specific information or records. To the extent required to prevent an unreasonable invasion of personal privacy interests protected by RCW 42.17.310 and 42.17.315, an agency shall delete identifying details in a manner consistent with RCW 42.17.310 and 42.17.315 when it makes available or publishes any public record; however, in each case, the justification for the deletion shall be explained fully in writing.

In the event of a conflict between this Privacy Notice and the Public Records Act, the Public Records Act provision will control.

SECTION E. PUBLIC ACCESS TO YOUR PERSONAL/ PRIVATE INFORMATION

Adaptive Threat Solution may require you to provide certain personal/private information in order to complete official university business transactions over the Internet. You may choose not to provide this information, but if you choose not to provide it we will be unable to complete an online transaction, and you will have to complete the transaction by some other means (such as in person, via email, or over the telephone).

The following laws may prevent Adaptive Threat Solution from disclosing the personal/private information about you except as necessary for (purpose and to whom) the completion of official university business.

SECTION F. YOUR RIGHT TO REVIEW AND CORRECT PERSONALLY IDENTIFIABLE INFORMATION

State law requires agencies that collect personally identifiable information to provide “procedures for correcting inaccurate information, including establishing mechanisms for individuals to review information about them and recommend changes in information they believe to be inaccurate.” (RCW 43.105.310)

You can access any personally identifiable information we collect about you by contacting [email protected] You may correct factual errors in your personally identifiable information by submitting an electronic mail or written request that credibly shows the error. We will take reasonable steps to verify your identity before granting access or making corrections.

SECTION G. COOKIES AND APPLETS

To better serve our users we may use “cookies” to customize your browsing experience with Adaptive Threat Solution. Cookies are simple text files stored on your computer by your web browser. Cookies created on your computer by using this website do not compromise your privacy or security.

Applets are tools downloaded to your computer to work with the software you have. Applets are intended to enhance your browsing experience by enabling you to view information in a unique manner or enable access to information that your computer would otherwise be unable to access without the applet.

Several of the most recent versions of browser software can notify you before a website places a cookie or applet on your computer. Some browsers will allow you to block the creation of cookie files and downloading of applets altogether if you choose, or provide the option of individually accepting or rejecting any particular cookie or applet request. You also may want to periodically check and delete cookie files and applets in the manner suitable for the browser you are using. Instructions to enable these features may be found in your browser’s Help menu.

You must allow your browser to accept cookies to be able to use certain WSU online systems. If you disable cookies or run a ‘cookie cruncher’ on your client computer, you will get errors when trying to use applications that use cookies.

SECTION H. SECURITY

Adaptive Threat Solution, as developer and manager of these websites, has taken several steps to safeguard the integrity of its data and prevent unauthorized access to information maintained by Adaptive Threat Solution. These measures are designed and intended to prevent corruption of data, block unknown or unauthorized access to our systems and information, and to provide reasonable protection of private information in our possession.

This information should not be construed in any way as giving business, legal, or other advice, or warranting as fail proof, the security of information provided via Adaptive Threat Solution websites.

SECTION I. DISCLAIMER

Neither the state of Washington, nor any agency, officer, or employee of the state of Washington warrants the accuracy, reliability, or timeliness of any information published by this system nor endorses any content, viewpoints, products, or services linked from this system and shall not be held liable for any losses caused by reliance on the accuracy, reliability, or timeliness of such information. Portions of such information may be incorrect or not current. Any person or entity who relies on any information obtained from this system does so at their own risk.

SECTION J. ADAPTIVE THREAT CONTACT INFORMATION

To review or correct your personal information, or for information about its collection and use, contact the link here

Privacy Policy