How We Gather Information
- Aggregate data: We gather certain usage information like the number and frequency of visitors to our mobile website. This information may include which URL you just came from, which URL you next go to, what browser you are using, and your IP address. We use such data only in the aggregate. This collective data help us determine how much our customers use parts of our websites, and do internal research on our customers' demographics, interests, and behavior to better understand and serve you. This type of aggregated, non-personally identifiable information may also be collected by third parties that support our services. In addition, we aggregate data and disclose such information in a non-personally identifiable manner to advertisers and other third parties for marketing and promotional purposes.
- Personally Identifiable Information: We also request information about you. This may include your name, address, phone number, birth date, gender, occupation and email address (collectively “personally identifiable information”). We seek such information to provide products and/or services that more closely reflect your preferences. In addition, we may use such personally identifiable information to improve our marketing and promotional efforts, to analyze website usage, improve our content and product offerings, and customize our website's content, layout and services.
- Tracking Traffic: We currently contract with Omniture to manage our traffic statistics. We use the services to help us measure how visitors use our site. To do this, we use Web beacons and cookies provided by Omniture on this mobile site. The type of information we collect includes unique visitors, page views, entry and exit points, and a variety of other aggregated data. By supplementing our records, this information helps us learn things like what pages are most attractive to our visitors, which of our products most interest our customers, and what kinds of offers our customers like to see. Although Omniture logs the information coming from our site on our behalf, we control how that data may and may not be used.
How We Use This Information
- Sharing: Periodically we share aggregated demographic information with our partners and advertisers. We use outside companies to bill users for goods and services. These companies do not retain, share, store, or use personally identifiable information for any secondary purposes.
How Third-Party Vendors, Sites, and Sponsors Use This Information
User Privacy Options
- Correcting/Updating Personal Information: If a user's personally identifiable information changes (such as zip code), or if a user no longer desires a service, we provide a way to correct, update, or remove that user's personal data. This is at the My Account page which can be accessed by logging in via a standard web browser at http://my.technologyreview.com/mytr.
- Choice/Opt-out: Users who no longer wish to receive one of our newsletters may unsubscribe on the My Account page which can be accessed via astandard web browser at http://my.technologyreview.com/mytr.
- Site and Service Updates: We send our users site and service announcements via email. Members are automatically subscribed to these service announcements, which contain important information about the site, user registration, or a subscribed service.
The Children's Online Privacy Protection Act (COPPA), passed by Congress in October 1998, requires the Federal Trade Commission (FTC) to issue and enforce rules concerning children's online privacy. The FTC issued the Children's Online Privacy Protection Rule in November 1999; it has been in effect since April 21, 2000. The Rule's primary goal: to place parents in control over what information is collected from their children online.
While Technology Review doesn't fall under the guidelines for sites that must adhere to COPPA, if parents inform us that their children have provided the company with personal information, the company will delete those files in a reasonable amount of time.
Commitment to Security
We take every precaution to protect our users' information. When a user submits sensitive information via the website, the information is protected both online and offline.
When our forms ask users to enter sensitive information, they are encrypted and protected with SSL encryption software. All of our users' information, not just the sensitive information mentioned above, is restricted in our offices. Only employees who need the information to perform a specific job (for example, a customer service representative) are granted access to personally identifiable information. All employees are kept up-to-date on our security and privacy practices. Finally, the servers on which we store personally identifiable information are kept behind a locked cage.
This website contains links to other sites. Technology Review, Inc. is not responsible for the privacy practices of other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each website that collects personally identifiable information.
Notification of Changes