We take commercially reasonable steps to protect your Personal Information from loss, misuse, and unauthorized access, disclosure, alteration or destruction. However, no Internet or e-mail transmission is ever fully secure or error free. Please keep this in mind when disclosing any Personal Information to us or to any other party via the Internet or through e-mail.
How Does Best Worthy Gather and Use Information?
We collect general statistics to track user trends on our Site. These statistics include hits to our server, the types of browsers used to access our Site, page views, and navigational patterns. The information that is collected in this manner does NOT provide us with any personally identifiable information about our users. It helps us track “where” our users are coming from. This allows us to pinpoint high traffic areas and determine the most effective ways to communicate with our users. As part of that ongoing analysis, Best Worthy also uses devices called “web beacons” to help us identify when emails sent to you have been received and read. In order to prevent the introduction of viruses and hackers into the Best Worthy site we may collect information, such as IP addresses, into a log file to be used to identify potential hackers of the Best Worthy site.
Personal Information You Provide Us.