This policy explains what information we gather when you visit www.niab.com, and explains how that information is used.
It is important for you to appreciate that the web site provides extensive links to other independent sites. This policy applies only to direct access to www.niab.com. You will need to consult the appropriate information on other sites for information on their policies.
In common with most web sites, this site automatically logs certain information about every request made of it (see below for more details). This information is used for system administration, for bug tracking, and for producing usage statistics. The logged information may be kept indefinitely.
Relevant subsets of this data may be passed to computer security teams as part of investigations of computer misuse involving this site. Data may be passed to the administrators of other computer systems to enable investigation of problems accessing this site or of system misconfigurations. Data may incidentally be included in information passed to contractors and computer maintenance organisations working for NIAB, in which case it will be covered by appropriate non-disclosure agreements. Otherwise the logged information is not passed to any third party except if required by law. Summary statistics are extracted from this data and some of these may be made publicly available, but those that are do not include information from which individuals could be identified.
You should appreciate that a log is a record of what a server sees, not necessarily what was initially sent. If a request is sent via a proxy the log file will show the proxy's address. If someone has forged your address the log file will show your address.
A number of fill-in forms are provided on this site. The pages containing these forms include information on how data submitted on them will be processed and used.
This site may use web "cookies" as part of user authentication (login) and to store information needed by other facilities.
The following data is automatically logged for each request:
Logging of additional data may be enabled temporarily from time to time for specific purposes. In addition, the computers on which the web site is hosted keep records of attempts (authorised and unauthorised) to use them for purposes other than access to the web server. This data typically includes the date and time of the attempt, the service to which access was attempted, the name or network address of the computer making the connection, and may include details of what was done or was attempted to be done.