Data Protection and Confidentiality
Some services on this website require us to collect personal information from you. To comply with the Data Protection Act, we have a duty to tell you how we store the information we collect and how it is used.
Any information you do submit will be stored securely and will never be passed on or sold to any third party.
For more detail, please see our Data Protection Policy developed to ensure we comply with the GDPR.
This website does not store any information that would, on its own, allow us to identify individual users of this service without their permission. Any cookies that may be used by this website are used either solely on a per session basis or to maintain user preferences. Cookies are not shared with any third parties.
User Anonymity and Personal Information
Log files are maintained and analysed with all requests for files on this website’s web servers. Log files do not capture personal information but do capture the user’s IP address, which is automatically recognised by our web servers.
Aggregated analysis of these log files is used to monitor website usage. These analyses may be made available to Tygnum’s staff to allow them to measure, for example, overall popularity of the site and typical user paths through the site.
Except as stated already, Tygnum will make no attempt to identify individual users. You should be aware, however, that access to web pages will generally create log entries in the systems of your ISP or network service provider. These entities may be in a position to identify the client computer equipment used to access a page. Such monitoring would be done by the provider of network services and is beyond the responsibility or control of Tygnum’s.
Tygnum will make no attempt to track or identify individual users, except where there is a reasonable suspicion that unauthorised access to systems is being attempted. In the case of all users, Tygnum reserves the right to attempt to identify and track any individual who is reasonably suspected of trying to gain unauthorised access to computer systems or resources operating as part of Tygnum’s web services.
As a condition of use of this site, all users must give permission for Tygnum to use its access logs to attempt to track users who are reasonably suspected of gaining, or attempting to gain, unauthorised access.
All log file information collected by Tygnum’s is kept secure and no access to raw log files is given to any third party.