BY USING THIS SITE YOU CONSENT TO THE FOLLOWING TERMS:
1. Information Collected.
You do not need to provide any personal information to use our Site and we do not collect any such information unless you provide it to us. When you do contact us, we may keep your messages together with your e-mail address and our responses.
Please do not post any personal information that you expect to keep private. Personally identifiable information you submit to StatusStalker.com, Inc. is purely voluntary and should not be of a particularly sensitive nature.
Although StatusStalker.com, Inc. uses a website visitor statistics program that compiles information about visitors to this site (such as browser type, pages accessed, duration of visit, and other usage statistics), that program does not identify you. StatusStalker.com, Inc. may also use a web logs program that collects your IP address and time stamp.
All postings are stored in our database, even after "deletion," and may be archived elsewhere. Our web logs and other records are stored indefinitely.
3. Information from Children.
This Site is not intended for use by children, especially those under the age of 13. We do not knowingly collect information from children but, due to the nature of electronic communication, urge parents and caregivers to thoughtfully address how children communicate electronically to ensure that their personal information is protected. If StatusStalker.com, Inc. learns that a posting is by a person under the age of 13, StatusStalker.com, Inc. will remove that post.
5. Use of Information.
We may also disclose your personally identifiable information if we reasonably believe we are required to do so by law or in the good faith belief that such disclosure is reasonably necessary to respond to subpoenas, court orders, or other legal process.
6. Protection of Information.
Although we make good faith efforts to store information collected in a secure operating environment that is not available to the public, we cannot guarantee complete security.
We employ standard security measures and do not use special encryption methods at this time.
7. Policy Changes