U.S National Institutes fo Health | cancer.gov NCI Logo

Cancer Intervention and Surveillance Modeling Network

Modeling to guide public health research and priorities

Privacy Policy & Disclaimers

Privacy Policy

The Statistical Research and Applications Branch (SRAB) respects the privacy of visitors to our Web site. We collect a limited amount of information on usage of the Web site for statistical purposes, in order to measure the number of visitors to the various sections of our site and to help us make our site more useful to visitors.

The U.S. Department of Health and Human Services, and the National Cancer Institute, of which SRAB is a part, do not disclose, give, sell, or transfer any personal information about your visit unless required by law to do so.

When inquiries are e-mailed to us, we store the question and the e-mail address information so that we can respond electronically. Unless otherwise required by statute, we do not identify anyone who sends questions or comments to our web site. We will not obtain any information that will allow us to personally identify you when you visit our site, unless you chose to provide such information to us.

Links to Other Web sites

Cisnet.cancer.gov has links to many other Web sites, including some sites which are maintained by non-governmental organizations or private companies. The SRAB is not responsible for the contents of any "off-site" Web page referenced from this server. Specifically:

Information Disclaimer

The information provided using this Web site is only intended to be general summary information to the public. It is not intended to take the place of either the written law or regulations.

Intrusion Detection

This site is maintained by the U.S. Government. It is protected by various provisions of Title 18, US Code. Violations of Title 18 are subject to criminal prosecution in federal court.

For site security purposes and to ensure that this service remains available to all users, we employ software programs to monitor traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from these sources may be used to help identify an individual.