- Website URL
Non-submitted Information collected to improve Edwardian Promenade:
- IP address
Information collected for contests run by Edwardian Promenade is immediately destroyed when the prize or award is given to the winner.
How Information is Used:
The primary goal in collecting information is to provide visitors with a customized experience when visiting the site and to make our site more valuable to everyone. It enables Edwardian Promenade to closely monitor which areas of the site are used most and to determine which areas can be improved upon. The information is used exclusively by Edwardian Promenade so that the site will continue to improve the value of the services and information offered to readers and visitors as a whole.
Personal information about you or your account will not be monitored, edited, or disclosed without your prior consent unless there is a belief that such action is necessary to: (i) comply with legal process or other legal requirements of any governmental authority; (ii) protect and defend the rights or property of Edwardian Promenade; (iii) enforce our Terms of Service; (iv) protect the interests of users of our services other than you or any other person; or (v) operate or conduct maintenance and repair of Edwardian Promenade’s services or equipment as authorized by law.
Edwardian Promenade does not rent or sell information about its readers or visitors, though if information is voluntarily disclosed in the comments, it may be collected and disseminated by third-parties, and result in, among other things, unsolicited inquiries, messages, and offers from third-parties. Edwardian Promenade also contains links to other web sites. Edwardian Promenade is not responsible for the privacy practices or the content of such web sites.
Information collected is securely stored within the server, and we use standard, industry-wide practices such as encryption, firewalls and (in some certain areas) SSL (Secure Socket Layers) for protecting your information. However, as effective as encryption technology is, no security system is impenetrable. We cannot guarantee the security of our database, nor can we guarantee that information you supply won’t be intercepted while being transmitted to us over the Internet.