You are viewing a Web site, archived on 15:04:19 Nov 10, 2004. It is now a Federal record managed by the National Archives and Records Administration.
External links, forms, and search boxes may not function within this collection.
Note that this document was downloaded, and not saved because it was a duplicate of a previously captured version
(14:25:23 Oct 22, 2004). HTTP headers presented here are from the original capture.
Thank you for visiting the EGov.gov
is clear: We will collect no personal information about you
when you visit our web site.
We do collect some technical information
when you visit to make your visit seamless. The section
below explains how
we handle and collect technical information when you
visit our web site.
Information Collected and Stored
When you browse, read pages or download information on
EGov.gov, we automatically gather and store certain
about your visit. This information never identifies
who you are. The information we collect and store about
is listed below:
The Internet domain (for
example, “xcompany.com” if
you use a private Internet access account, or “yourschool.edu” if
you connect from a university’s domain)
and IP address (an IP address is a number that
is automatically assigned
to your computer whenever you are surfing the
Web) from which you access our web site;
of browser (e.g., Netscape, Internet Explorer)
and operating system (Windows, Unix) used to
The date and time you access
The pages you visit; and
linked to the egov.gov web site from another web site,
the address of the web site.
This information is only
used to help us make the site more useful for you. With this data we learn
of visitors to our site and the types of technology
our visitors use. We never track or record information
and their visits.
For site security purposes
and to ensure that this service remains available to
all users, this government computer
system employs commercial software programs
to monitor network traffic to identify unauthorized attempts
to upload or change
information, or otherwise cause damage.
for authorized law enforcement investigations, no other
attempts are made to identify individual
users or their usage habits. Raw data logs are used for no other purposes
and are scheduled for regular destruction
in accordance with National Archives and Records Administration guidelines.
attempts to upload information or change information
on this service are strictly prohibited
and may be punishable under the Computer Fraud and Abuse Act of 1986 and the
National Information Infrastructure Protection Act.