Privacy Policy
At The Threat Report.com we consider the privacy of our visitors to be extremely important. This privacy policy document describes in detail the types of personal information is collected and recorded by The Threat Report.com and how we use it.
Log Files
Like many other Web sites, The Threat Report.com makes use of log files. These files merely log visitors to the site – usually a standard procedure for hosting companies and a part of hosting services’ analytics.
The information inside the log files includes internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and possibly the number of clicks. This information is used to analyze trends, administer the site, track user’s movement around the site, and gather demographic information.
IP addresses, and other such information are not linked to any information that is personally identifiable.
Cookies and Web Beacons
The Threat Report.com uses cookies to store information about visitors’ preferences, to record user-specific information on which pages the site visitor accesses or visits, and to personalize or customize our web page content based upon visitors’ browser type or other information that the visitor sends via their browser.
Third Party Privacy Policies
You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. The Threat Report.com’s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.