A. The Types of Information We Collect About You:
When you visit and browse the Site, we may collect two different types of information about you: information you provide to us, and information we collect through technology.
1. Information You Provide to Us
In order to obtain access to certain services provided via the Site and request certain information regarding Corya Resources directly from the company via the Site, you may be required to provide personally identifiable information such as your name, postal address, e-mail address, telephone number, facsimile number and investor status. You can choose not to provide this information, but then you might not be able to gain access to such information and services.
2. Information We Collect Through Technology:
We may collect information about you through technology. For example, when you visit the Site, we may collect your IP address. (An IP address is often associated with the portal through which you enter the Internet, like your ISP (Internet service provider), your company, or your university.) Standing alone, your IP address is not personally identifiable. At times, we may also use IP addresses to collect information regarding the frequency with which visitors browse various parts of the Site. We may combine this information with personally identifiable information.
The Site may also use other technical methods to track visitor usage, including web beacons. (“Web beacons” are small pieces of data that are embedded in images on the pages of a website.) We may also use these technical methods to analyze the traffic patterns on the Site, such as the frequency with which our users visit various parts of the Site. These technical methods may involve the transmission of information either directly to us or to another party authorized by us to collect information on our behalf. We may also use these technical methods in HTML e-mails that we send visitors to the Site to determine whether such visitors have opened those e-mails and/or clicked on links in those e-mails. We may collect the information from use of these technical methods in a form that is personally identifiable.
We may provide links on the Site to third parties. In addition, third parties may also provide links to the Site. Should you choose to visit these third-party sites, you should review their privacy policies to ensure you understand and are comfortable with their practices concerning your personal information. We do not accept, and do disclaim, any responsibility for the privacy policies and information protection practices of any third-party website (whether or not such site is linked on or to the Site). These links are provided to you for convenience purposes only, and you access them at your own risk.
B. How Personally Identifiable Information We Collect About You is Used:
We may use personally identifiable information we collect about you when you visit and browse the Site in many ways. Representative examples of the ways in which we may use personally identifiable information we collect about you when you visit and browse the Site are set forth below.
1. Use in Connection with Normal Business Operations
2. Use in Connection with Third Party Offers
We may also share your information with third parties when you engage in certain activities on the Site that are sponsored by third parties, such as purchasing products or services offered by a third party, or electing to receive information or communications from a third party. When you participate in such, you will either be required or requested to agree that the sponsor or business associate may use your personal information (including, in some cases, your e-mail address) in accordance with the sponsor or business associate’s privacy practices.
3. Other Uses
C. Additional Ways Personally Identifiable Information May be Disclosed
D. The Security Measures We Take to Safeguard Your Personally Identifiable Information
The security and confidentiality of your information is extremely important to us. We have implemented technical, administrative, and physical security measures to protect guest information from unauthorized access and improper use. From time to time, we review our security procedures in order to consider appropriate new technology and methods. Please be aware though that, despite our best efforts, no security measures are perfect or impenetrable.
E. Updating Your Contact Information and Communication Choices
We will provide you an opportunity to update your contact information and/or modify your communication choices by sending you an e-mail or other communication that invites your response, or by providing a means to update that information via the Site. You may unsubscribe from e-mail communications by clicking on unsubscribe links in those e-mails.