We remind you that if you link to a site outside of MileMaven.com,
you are subject to the policies of the new site.
Here is how we handle information about your visit to our Web site:
Information Collected and Stored Automatically
If you visit our site to read or download information, we collect and store the following information about your visit:
This information is collected for statistical analysis and technical improvements to the site. We use software programs to create summary statistics, which may be used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
- The IP address (a number that is automatically assigned to your computer when you are using the Internet) from which you access our site;
- The type of browser and operating system used to access our site;
- The date and time you access our site;
- The Internet address of the Web site from which you linked directly to our site; and
- The pages you visit and the information you request.
If You Send Us Personal Information
You do not have to provide any personal information to visit this Web site. If you choose to provide us with personal information, such as by sending a message to an e-mail address on this Web site or by filling out a form and submitting it through our Web site, we will use that information to respond to your message or to fulfill the stated purpose of the communication.
For site security purposes and to ensure that this service remains available to all users, MileMaven.com
employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals evidence of possible abuse or criminal activity, such evidence may be provided to appropriate law enforcement officials. Unauthorized attempts to upload or change information on this server are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996.