Sign up for email updates


Privacy Policy

Information Collected and Stored Automatically

We collect and store information helpful for site management purposes- like traffic statistics, referral websites, and site use.  This helps us improve the experience of future visitors.  If all you do during your visit is browse through the Web site, read pages, or download information, the only information our office will gather and store about your visit is the following:

  • The Internet domain (for example, "aol.com" or "xcompany.com") from which you access the Internet;
  • The IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access our Web site;
  • The type of browser and operating system and connection speed used to access the site;
  • The date and time you access the site;
  • The pages you visit; and
  • If you linked to the office Web site from another Web site, the address of that Web site.

Other Information Collected by Your Request

If you send our office an e-mail or you fill out a form with your personal information and submit it through our Web site – we will collect and store your e-mail address and the content of your communication in order to consider and possibly reply to your communication.
In order to better serve your needs, our office may share the information you give me with another government agency that is better equipped to respond to your concerns. Additionally, federal law may require that certain unlawful communications be forwarded to appropriate law enforcement agencies.
Information on Children: We do not ask children 13 and under for any identifying information. We do not knowingly collect personally identifiable information from children 13 and under.

Links to Other Sites

Our web page contains links, some of which are to other sites or other federal agencies. Once you link to another site, you are subject to the privacy policy of the new site.
Unauthorized use, tampering with or modification of this system -- or its supporting hardware or software -- may violate federal or other statutes and may subject the violator to criminal and civil penalties. In the event of unauthorized intrusion, all relevant information regarding possible violation of law will be provided to law enforcement officials.