Acceptable Usage Policy
By reading content, sharing content on social media, commenting on blogs, registering for an account, sending us information via the contact us form, or engaging in any other form of communication through the site (collectively "the content"), you are stating:
- You have copyright and authorization to share any and all information you provide to and via the Challenge site.
- You are offering the information to the Wildlife Crime Tech Challenge royalty-free, with perpetual, non-exclusive, unrestricted usage of the content.
- If you contribute any graphic images or photographs, you accept all liability for any model or property release issues that may arise from an individual or trademarked property in the content. Please do not submit any images or photographs for which you do not have a current model or property release.
- You will not post any material that is knowingly false, misleading, or inaccurate.
- You will not behave in an abusive and/or hateful manner and will not harass, threaten, nor attack anyone.
- You will not use profanity and will neither post with language or content that is obscene, sexually oriented, or sexually suggestive nor link to sites that contain such content.
- You will not use the Challenge site to violate any U.S. laws nor to discuss committing illegal activities.
- You will not to impersonate any person or entity, forge headers, or otherwise manipulate identifiers in order to disguise the origin of any posting, nor collect or store personal data about other users.
- You will not post any copyrighted material, nor link to any copyrighted material (with the exception of publicly available sites and pages that the legal owners of the copyrights have created to make that material freely available to the general public), unless that copyright is owned by you or by the Challenge.
- You will not use the site for the purposes of sharing or distributing viruses, licenses, registration information, software keys, "cracks," or other information designed to do harm to or allow unlawful access to any computer hardware, software, networks, or any other systems.
- You will not post advertisements, chain letters, pyramid schemes, or solicitations, all of which are inappropriate and prohibited on the Challenge site. You will not, furthermore, collect personal information about the Challenge site members for the purpose of sending them any such advertisements, chain letters, pyramid schemes, or solicitations through other means (email, messaging programs, etc.).
- You will not post messages that are clearly outside of the stated topic of any blog article nor disrupt a comment thread by deliberately posting repeated irrelevant messages or copies of identical messages (also known as "flooding").
- You will not attempt to access any protected sections of the Challenge site, nor make use of any hacks, cracks, bug exploits, etc. to bypass or modify the features of the Challenge software.
- You will, if asked by a representative of the Challenge, cease posting any content, and/or links to content, deemed offensive, objectionable, or in poor taste by the Challenge Team.
The Challenge site moderators do not and cannot review all of the content of every message posted and do not accept responsibility for the contents of any messages. We reserve the right to delete any message and/or restrict posting rights on the Challenge site for any reason whatsoever. Should you continue to post messages that violate the rules of the Challenge site, your account may be terminated; your access to the Challenge site may be banned; and furthermore, we expressly reserve our rights under the law to take any other actions we deem necessary.
The Challenge also reserves the right to disclose personal information when required by law or in the good-faith belief that such action is necessary to conform to the edicts of the law or comply with a legal process served on the Challenge site, protect and defend the rights or property of the site or visitors to the Challenge site, identify persons who may be violating the law, the legal notice, or the rights of third parties, and cooperate with the investigations of purported unlawful activities.
About Links to Other Sites
The Challenge site may contain links to other sites. The Challenge site does not control the information collection of sites that can be reached through links from our site. If you have questions about the data collection practices of linked sites, please contact those companies directly.
If you find any posts on the Challenge site to be offensive or objectionable, or if you have reason to believe the privacy and security of the site has been compromised, please contact us via email at email@example.com and/or use our Contact Us form as soon as possible.
Questions and Answers
How can I modify or update my information?
You can create an account at any time, where you share your username, first and last name, and an email address. You can always update your profile (change your username, email address, or your password) by clicking on My Account in the top right corner of this page. You can also contact technical support at firstname.lastname@example.org for help.
How can I remove information on the Challenge site?
You can edit any comment you have made. If you are having trouble, please contact technical support at email@example.com to remove information.
We collect no personal information about you when you visit our website unless you choose to provide this information to us. However, we collect and store certain information automatically. Here is how we handle information about your visit to our website.
What We Collect and Store Automatically
Even if you do nothing during your visit but browse through the website, read publications, or download information, we will automatically gather and store certain information about your visit. This information does not identify you personally. We automatically collect and store only the following information about your visit:
- The IP address (an IP address is a number that is assigned to each computer connected to the Internet) from which you access our website
- The type of browser and operating system used to access our site
- The date and time you access our site
- The pages you visit
- If you linked to our website from another website, the address of that website
We use the information we collect to count the number and type of visitors to the different pages on our site and to help us make our site more useful to visitors like you.
If You Choose to Provide Personal Information
You may choose to provide us with personal information on this website, including your name and email address. If you choose to provide blog comments, you must supply your name and email address. You can create an account as well. This information is collected only if specifically and knowingly provided by you. Personally identifying information you provide will be used only in connection with wildlifecrimetech.org or for such other purposes as are described at the point of collection. We also collect information on social media shares. We do not give or sell any personal information to a third party.
If You Send Us Email
You may choose to provide us with personal information in an email with a comment or question. We use the information to improve our service to you or to respond to your request. We will also log all emails sent to us through blog comments. Except for authorized law enforcement investigations, we do not share our email with any other outside organizations.
A "persistent cookie" is a small text file that is stored on your computer and makes it easy for you to move around a website without having to continually re-enter your name, password, preferences, etc. Our website does not use persistent cookies. A “session cookie” is a small text file that is not stored on your computer but is kept in memory while you are connected to our website and is erased when you close your browser. We use session cookies only to make your visit more productive for you.
Securing the Information We Collect Online
We are committed to properly securing the information we collect online. To help us accomplish this, we take the following steps:
- We employ internal access controls to ensure that only people who see your information are those with a need to do so to perform their official duties.
- We train relevant personnel on our privacy and security measures so that our personnel know what is required for our compliance.
- We regularly back up the information we collect online to insure against loss.
- We use technical controls to secure the information we collect online, including: encryption, firewalls, password protections, etc.
- We periodically test our security procedures to ensure personnel and technical compliance.
- We employ external access safeguards to identify and prevent unauthorized attempts by outsiders to hack into, or cause harm to, the information in our systems.
Tampering with this website is against the law. If anyone tries to tamper with it, they may be punished under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Links to Other Sites