Skip to main content E-Gov logo Powering America's future with technology.
 
 

Privacy & Security Notice

Thank you for visiting the EGov.gov Web site and reviewing our privacy policy. Our privacy policy is clear: We will collect no personal information about you when you visit our Web site.

We do collect some technical information when you visit to make your visit seamless. The section below explains how we handle and collect technical information when you visit our Web site.

Information Collected and Stored Automatically

When you browse, read pages or download information on EGov.gov, we automatically gather and store certain technical information about your visit. This information never identifies who you are. The information we collect and store about your visit is listed below:

  • The Internet domain (for example, ”xcompany.com“ if you use a private Internet access account, or ”yourschool.edu“ if you connect from a university’s domain) and IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access our web site;
  • The type of browser (e.g., Netscape, Internet Explorer) and operating system (Windows, Unix) used to access our site;
  • The date and time you access our site;
  • The pages you visit; and
  • If you linked to the egov.gov Web site from another web site, the address of the Web site.

This information is only used to help us make the site more useful for you. With this data we learn about the number of visitors to our site and the types of technology our visitors use. We never track or record information about individuals and their visits.

Site Security

  • For site security purposes and to ensure that this service remains available to all users, this government computer system employs commercial software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
  • Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
  • Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.