Log in
Jodrell Bank radio observatory
Cheshire, England
Allen Watkin, 2009-05-24 11:35

Privacy, identification and data collection

Jump to: CookiesData collectionPrivacy policies

Cookies: for internal use only

No third-party tracking cookies — except for payment processing
We do not host any third-party cookies: we will never help data aggregation, credit-referencing or advertising companies or other third parties to track your navigation or activities around the internet at large.
Session cookies
We use session cookies to help improve our service to you, and specify cookie attributes for improved security. Session cookies enable us to remember your preferences and service your requests more securely.
Persistent cookies
At the time of writing, we are not using persistent cookies to identify our users; however, we may still try to identify repeat visits, e.g. for security and commercial reasons, or when users log in or transact business.
Advertisements: no third-party tracking media, except for payment processing
Any third-party advertisement images or other media resources displayed on our Web site will always be hosted by us or by carefully selected hosting & payment-processing suppliers; in order to protect your privacy.

Data collection, retention and processing policies

Your network address: ::
We record this information in our databases for various reasons including security and traffic analysis to enhance and protect our Web site so as to serve you better. We will usually delete your network address data after a period of 1–7 years before erasing or anonymising these data, depending on the reasons why we are retaining it.
Your geographical location: United States
We use your network address data to estimate your real-world location, e.g. to provide you with more relevant information using languages and communication customs you are likely to prefer. Depending on the services you request from us, we might ask for more detailed information about your location by querying GPS parameters via Javascript. We accumulate statistics on visitor demographics and use these statistics to focus our business activities and inform our business strategy.
Your preferred languages: en-US, en
Your Web browser tell us which languages you prefer. We customise our Web site to communicate most effectively with you, and prioritise our user-interface development efforts according to language popularity among our potential customers.
Your browser software: {Robot}
We try to identify your Web browser software. This enables us to focus our software testing on the browsers most frequently used on this Web site, focus our break-fix efforts on the browsers used to submit support tickets, and customise our Web site for improved compatibility.
Third-party payment processing💳
We do not process nor store third-party payment credentials! In order to protect the security of your payment details, we use reputable 3rd-party payment processing services. We are also working toward the higher tier of PCI DSS standards.
Strong cryptographic security
We store authentication secrets (e.g. passwords) in salted & hashed form, using an appropriate slow hash function. We enforce strict password strength policies.
To help protect your privacy, our server is configured to require strong SSL/TLS cryptography for all HTTP connections: therefore, some obsolete operating systems or Web browsers may be incompatible with our Web site.
Our systems are designed to be impervious to SQL injection and Cross Site Request Forgery attacks.

Privacy policies🔑

Information Commissioners Office: official registration
Our UK Data Protection Act registration: no. Z9071433
Security, jurisdiction & legal standards
AAABIT provides a professional service committed to data protection principles such as privacy and information security. We store our clients' data exclusively on well-maintained & adequately secured machinery within the client's home country or within nearby jurisdictions where similar legal standards apply: where we supply digital services across borders, we apply the stricter standards of data privacy, giving the greater protection to our data subjects & clients. The efforts we make to secure our systems are commensurate with the types of data stored and the likely security threats. We select upstream suppliers carefully and encourage all concerned to implement secure and workable data protection policies and procedures. For more specific and technical information about our data collection, privacy, and security policies; please visit our privacy data page.
Collection and use of data
Client-supplied data stored in AAABIT systems remain the property of said client(s) or the relevant data subject(s). Rights to the value added by AAABIT to these data remain with AAABIT until payment in full is received. We reserve the right to extract anonymous aggregate data to help improve our products and services: by using our products or services, you give us permission to do this. We only collect sensitive data when required: we conduct regular audits to ensure that we are only storing information necessary to support legitimate processes. Publicly accessible information stored in our systems by third parties may be moderated, edited, or deleted without prior notice by AAABIT; to maintain accuracy, to ensure the stability or sustainability of our services, or for other editorial, administrative, or legal reasons. Additional privacy protection policies may apply to records that we store or process on behalf of our clients: where multiple agreements, contracts, jurisdictions or regulations apply, we shall endeavour to act in the best interests of the data subject(s), and in accordance with the law.
Principle of informed consent, declaration of identity
We apply the principle of informed consent. Except to fulfil the legitimate requirements of the law, we will never transfer data owned by clients or third-party data-subjects to any person or organisation that does not agree with these terms and conditions, without the express consent of the data owners. For your part, you agree only to transact business here (log in, communicate, read/amend confidential data, undertake agreements, make financial transactions etc.) under the auspices of your own real official identity.