Some services on this website require us to collect personal information from you, to comply with the Data Protection Act, we have a duty to tell you how we store the information we collect and how it is used.
Any information you do submit will be stored securely and will never be passed on or sold to any third party.
Personal information and anonymity of our users Log files are maintained and analysed of all requests for files on this website’s web servers.
Log files do not capture personal information but do capture the user’s IP address, which is automatically recognised by our web servers.
Aggregated analysis of these log files is used to monitor website usage, the analysis of this data may be made to available to Beaver Bridges Ltd staff to allow them to measure the popularity of the site and typical user paths used.
Except as stated already, Beaver Bridges Ltd will make no attempt to identify individual users.
You should be aware, that access to web pages will generally create log entries in the systems of your ISP or network service provider, these entities may be in a position to identify the client computer equipment used to access a page. Such monitoring would be done by the provider of network services and is beyond the responsibility or control of Beaver Bridges Ltd.
Beaver Bridges Ltd will make no attempt to track or identify individual users, except where there is a reasonable suspicion that unauthorised access to systems is being attempted, in the case of all users Beaver Bridges Ltd reserves the right to attempt to identify and track any individual who is reasonably suspected of trying to gain unauthorised access to computer systems or resources operating as part of Beaver Bridges Ltd services.
As a condition of use of this site, all users must give permission for Beaver Bridges Ltd to use its access logs to attempt to track users who are reasonably suspected of gaining, or attempting to gain, unauthorised access.
All log file information collected by Beaver Bridges Ltd is kept secure and no access to raw log files is given to any third party.