House Seal

 Search the site

Home
Analyses
News Releases
Congressional Budgets
President's Budget
Budget Facts
Budget Process
Hearings & Markups
Democratic Members
Links
Contact Us

 

U.S. Representative John Spratt


Privacy and Security Notice


We respect the privacy of our on-line visitors and collect only a very limited amount of user information. This information is used only to improve the content and design of the Web site. If you visit our site to read or download information, we collect and store only the following information:

  • the date and time you access our site,
  • the particular pages of our web site you visit,
  • the name of the domain from which you access the Internet (for example, aol.com, if you are connecting from an America Online account), and
  • the Internet address of the web site from which you linked directly to our site or the Internet address of the computer used to link to our site.

We collect this information on an aggregate basis only (for example, which pages are most popular among visitors as a whole). This information is used to help improve the web page, is for internal review only, and is not shared with any outside parties. This government computer system uses software programs to create summary statistics using this information. These statistics are used for such purposes as assessing the number of visitors to the different sections of our site, what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

Visitors who send email to the staff via this web site will not have their information shared with any other party without their consent. Information collected in this manner is for informational purposes only.

For site security purposes, this computer system employs software programs to monitor network traffic. Anyone using this system consents to the monitoring of their use by system or security personnel. Unauthorized use, tampering with or modification of this system -- or its supporting hardware or software -- may violate federal or other statutes and may subject the violator to criminal and civil penalties. In the event of unauthorized intrusion, all relevant information regarding possible violation of law may be provided to law enforcement officials.


--back to home page--