Department of the Interior pages with children as their primary audience can be gateways to other information which you may enjoy. That means that when you click on links, you may be leaving our site. We don't create or maintain content on other folks' websites, but we do provide a warning on any link to a dot-com site. If you have questions or comments about the information on another site, you should use the email links or forms that site has provided.
Interior websites with children as their primary audiences do not ask for or collect personal, individually-identifiable information. We do use web analytics so we can see how many visitors we have, but we can't tell personal information from them. If any visitor to the site chooses to provide us with personal information, as in an email inquiry, that information will be used only to respond to the message. The information will not be used for any purpose other than to respond to the inquiry. We do not create individual profiles from the information provided or distribute the information to other organizations.
Remember: When you click on a link, you may be leaving our site. Government sites that we provide links to also have to follow special rules for their youth-focused sites, but non-government sites do not have to follow the same rules. You may click to a site that will ask you for personal information, like your name, address, telephone number, or email address. Before you provide any information, show your parent or some other responsible adult what you are doing. Be safety smart!
Links on Interior sites may take your children to other sites. A majority of the links we provide will take your children to other government sites. It is important that you monitor your children's communication on-line to insure that they do not provide personally identifiable information to websites that you feel are unacceptable. Tell your children to ask you or another adult to look at what they are doing first if they wish to provide their name, address, telephone number, or email address to a website.
The following is how we will handle information we learn about you from your visit to our website. The information we receive depends upon what you do when visiting our site.
We will collect no personal information about you when you visit our website unless you choose to provide that information to us. We collect and store only the following information about you: the name of the domain from which you access the Internet (for example, aol.com, if you are connecting from an America Online account, or princeton.edu if you are connecting from Princeton University's domain); the date and time you access our site; and the Internet address of the website from which you linked directly to our site.
We use the information we collect to measure the number of visitors to the different sections of our site, and to help us make our site more useful to visitors.
If you send us personal identifying information by e-mail (for example, in a message containing a question or comment, or by filling out a form that e-mails us this information), we use it to respond to your requests. We may forward your e-mail to other Government employees or contract personnel who are better able to answer your questions. We do not keep or distribute lists of e-mail addresses to any parties outside of the Department except as necessary to conduct official U.S. Government business. In no event, do we distribute lists of e-mail addresses to non-Government entities.
We want to be very clear: We will not obtain personally-identifying information about you when you visit our site, unless you choose to provide such information to us.
For site security purposes and to ensure that this service remains available to all users, Department of the Interior (DOI) webservers employ industry-standard methods to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Unauthorized attempts to upload information or change information on DOI servers are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act. In the specific context of this security monitoring, there is no expectation of privacy. However, only in the case of actual law enforcement investigations, will we attempt to identify individual users or their usage habits.