Information Collected and How It is Used
If you do nothing during your visit to Cultural Landscape Legacies Inc. (CLL) Web Site but browse or download information, we automatically collect and store the following information about your visit:
- The Internet Protocol address and domain name used but not the email address. The Internet Protocol address is a numerical identifier assigned either to your Internet service provider or directly to your computer. We use the Internet Protocol Address to direct Internet traffic to you;
- The type of browser and operating system you used and your connection speed;
- The date and time you visited this site;
- The web pages or services you accessed at this site;and
- The web site you visited prior to coming to this web site.
The information we automatically collect or store is used to improve the content of our web services and to help us understand how people are using our services. CLL analyzes our web site logs to continually improve the value of the materials available on our site. Our web site logs are not personally identifiable, and we make no attempt to link them with the individuals that browse CLL.
Personal Information and Choice
“Personal information” is information about an individual that is readily identifiable to that specific individual. Personal information includes personal identifiers such as an individual’s name, address, and phone number. A domain name or Internet Protocol address is not considered personal information.
We collect no personal information about you unless you voluntarily participate in an activity that asks for information (i.e. sending an e-mail or participating in a survey). If you choose not to participate in these activities, your choice will in no way affect your ability to use any other feature of Wisconsin.gov.
If personal information is requested on the web site or volunteered by the user, state law and the federal Privacy Act of 1974 may protect it.
Users are cautioned that the collection of personal information requested from or volunteered by children on-line or by email will be treated the same as information given by an adult and may be subject to public access.
What is a Cookie?
A cookie is a small amount of data, which may include an anonymous unique identifier, that is sent to your browser from a web site’s computers and may either be used only during your session (a “session” cookie) or may be stored on your computer’s hard drive (a “persistent” cookie). Cookies can contain data about user movement during the visit to the website. If your browser software is set to allow cookies, a web site can send its own cookie to you. A web site that has set a cookie can only access those cookies it has sent to you, it cannot access cookies sent to you by other sites.
Why are Cookies Used on Web Sites?
Cookies are one mechanism for maintaining continuity during a user’s visit to a web site. They allow data to be maintained for users’ benefit as they navigate a site. This is referred to as “session” or “state management” cookie. These cookies go away when you terminate your visit to the website as they are maintained only in your browser’s active memory during your session. Cookies may also be stored on your computer so that you can be recognized by a website on subsequent visits. They can be read by the website that set them whenever you enter the website. They are often used on websites that require you to log in to save you entering all of your log-in information. They may store information on your unique identifier and the areas of the website you have visited before. These cookies are stored on your computer’s hard drive after you have left your website visit and consequently are often referred to as “persistent” cookies.
Choices about Cookies
You can configure your browser to accept all cookies, reject all cookies, or notify you when a cookie is set. (Each browser is different, so check the “Help” menu of your browser to learn how to change your cookie preferences.)
The Department of Administration, as developer and manager of Wisconsin.gov, has taken several steps to safeguard the integrity of its telecommunications and computing infrastructure, including but not limited to authentication, monitoring, auditing, and encryption. Security measures have been integrated into the design, implementation and day-to-day practices of the entire DOA operating environment as part of its continuing commitment to risk management.
This information should not be construed in any way as giving business, legal, or other advice. This information should not be construed as warranting as fail-proof the security of information provided through DOA supported web sites.