The Rapid Response Surveillance Studies (RRSS) Web site is operated by the SEER Program and the Applied Research
establishes how RRSS will use information gathered from your visit to our site.
If You Visit the RRSS Web Site
We collect a limited amount of information on usage of the Web site for statistical purposes, in order to measure
the number of visitors to the various sections of the site and to help us make the site more useful to visitors.
Our Web site logs do not contain information that can be used to personally identify an individual visitor,
and we make no attempt to link them with such information. We do not use "cookie" technology on this
If You Send Us E-mail
By sending us an e-mail message, you may be sending personal information (e.g., your name, address, and e-mail
address). We will store this information in order to respond to your request or otherwise resolve the subject
matter of your e-mail. Please note, however, that e-mail messages are sent over the Internet as free text and
are not secure from interception by unauthorized third parties.
Links to Other Web Sites
The RRSS site has links to other Web sites, including some sites which are maintained by non-governmental organizations
or private companies. RRSS is not responsible for the contents of any off-site Web page referenced from this
site. When users select a link to an external Web site, they are leaving the RRSS Web site and are subject to
the privacy and security policies of the owners/sponsors of the external site.
Reference in this Web site to any specific commercial products, process, service, manufacturer, or company
does not constitute endorsement or recommendation by the US Government.
This site is maintained by the US Government. It is protected by various provisions of Title 18, US Code. Violations
of Title 18 are subject to criminal prosecution in federal court.
For site security purposes, and to ensure that this service remains available to all users, we employ software
programs that monitor traffic to identify unauthorized attempts to upload or change information, or otherwise
cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal
process, information from these sources may be used to help identify an individual.