|What Information is Collected and How it is Used
Usage Statistics. In order to generate usage statistics to help us improve our website, we automatically collect information on every visit without identifying the visitor. The following information is compiled to produce web usage statistics and is destroyed after three months:
- the visitor's IP address,
- the date and time the visitor accesses our site and
- the Internet address of the site from which the visitor linked to our site.
Web Cookies. The use of web cookies is discouraged on our websites. Temporary cookies, however, may be used when necessary to complete a transaction. If a persistent web cookie is required, the web page discloses to visitors that a persistent cookie is being used. Information collected on our websites including information from persistent web cookies is generally subject to Ohio Public Records Law except as otherwise provided by Ohio or federal law.
Online Forms and E-mail. We only collect personal information when necessary to provide a service to the public or state agencies. Any personal information voluntarily provided by visitors, including personal information from online forms and e-mail, will be used for the purpose stated on the web page on which it was collected and may be shared with our staff and other state agencies to respond to or process the e-mail or online form. In addition, information may also be shared with our staff and other agencies as required by law or pursuant to agency authority. Information collected on our website and e-mail sent to us is generally subject to Ohio Public Records Law except as otherwise provided by Ohio or federal law.
Choices Available to Visitors Regarding Collection, Use and Distribution of Information
Visitors will only receive information from us in response to a request. There may be instances where we send ongoing updates or announcements to interested parties. In such cases, visitors will have the choice whether or not to receive these updates or announcements.
Security Measures to Protect Information Under Our Control
We take very seriously the integrity of the information and systems that we maintain. As such, we have instituted security measures for all information systems under our control so that information will not be lost, misused or altered.
For site security purposes and to ensure that our Internet services remain available to all users, we employ software programs to monitor traffic to identify unauthorized attempts to upload or change information or otherwise cause damage. In the event of authorized law enforcement investigations and pursuant to any required legal process, information from these sources may be used to help identify an individual.