- The Institute
- Research & Publications
- International Programs & Reach
As a general rule, EDII will not sell, swap, rent, or otherwise disclose to any third party any such personal information for commercial purposes. Such information will be utilized only for the purpose stated. To accomplish such a purpose, EDII may disclose the information to its employees, consultants and agents who have a legitimate need to know the information. EDII also reserves the right to disclose this information under special circumstances, including disclosures required by law, court order or circumstances under which disclosure, in the sole discretion of EDII, is necessary to protect the legal rights, including the intellectual property rights, of EDII.
When you connect to our website, our web server may record the Internet Protocol (IP) address of the user computer, information about your browser and operating system, date and time of access and the internet address and page which linked you to our web site. The staff of EDII uses such information to diagnose problems, to administer and improve our website and to generate aggregate statistical reports that analyse general user information and demographics. Unless required by legal process, we do not link IP addresses to anything personally identifiable. This means that user sessions may be tracked by IP address, but a user’s identity remains anonymous.
Generally, we do not disclose site usage to third parties by individual IP addresses, but may do so in very limited circumstances when complying with law or legal process, working with consultants assisting us in fixing or improving our site, or in monitoring and improving the security of our network.
The security measures in place to protect the loss, misuse and alteration of the information under our control. While EDII remains committed to protecting the privacy of our users, we cannot ensure or warrant the security of any information you transmit to us, and you do so at your own risk. Once we receive your transmission, we make our best effort to ensure its security on our systems. We do so by using secure technology, privacy protection controls, and restrictions on employee access.