

{"id":844,"date":"2025-12-02T02:51:06","date_gmt":"2025-12-02T02:51:06","guid":{"rendered":"https:\/\/www.totalrelationshipmarketing.com\/?page_id=844"},"modified":"2025-12-02T02:52:25","modified_gmt":"2025-12-02T02:52:25","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/security-policy\/","title":{"rendered":"Security policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"844\" class=\"elementor elementor-844\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-827f956 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"827f956\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06df165\" data-id=\"06df165\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eee81cd elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"eee81cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"> Security policy <\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-4f02d69 e-flex e-con-boxed e-con e-parent\" data-id=\"4f02d69\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5638b0e elementor-widget elementor-widget-text-editor\" data-id=\"5638b0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Web Security Policy:<\/strong><br \/>For security purposes and to make sure our website remains available to all users, we use special software programs for monitoring network traffic to identify unauthorized attempts to upload or change information, or otherwise to cause damage to this government computer system. These programs collect no information that would directly identify individuals, but they do collect information that could help us identify someone attempting to tamper with this website.<\/p><p>If you use our website, you should understand that all activities may be monitored and recorded. Anyone using this system expressly consents to such monitoring.<\/p><p>WARNING \u2026 If such monitoring reveals possible evidence of criminal activity, monitoring records may be provided to law enforcement officials. Except for authorized law enforcement investigations, we make no other attempts to identify individual users or their usage habits. We only use raw monitoring data logs for determining trends in usage patterns and in diagnosing system problems.<\/p><p><strong>Cookies:<\/strong><br \/>What are cookies? A cookie is a small piece of information that is sent to your browser when you access a website. The use of cookies is an industry standard and they are found at most major websites. There are two kinds of cookies. A session cookie is a line of text that is stored temporarily in your computer\u2019s RAM. It is never written to a computer\u2019s drive and it is destroyed as soon as you close your browser. A persistent cookie is a more permanent line of text that gets saved by your browser to a file on your hard drive. Depending on your browser settings, you may receive notification that a site is requesting cookie information, possibly with an expiration date. Persistent cookies have a future expiration date. Session cookies have no date associated with them.<\/p><p>On those pages where IES uses \u201ccookies\u201d to facilitate your use of our site, we do not collect personal information about you and the cookie is destroyed when you exit your browser. There is no information stored on your computer and no unauthorized files are written onto your disk drives. These cookies are called \u201csession cookies\u201d. They help you use our website interactively and are destroyed when you close your browser.<\/p><p>These \u201csession cookies\u201d do not collect information about you, but only about your browser \u201csession\u201d The cookie makes it easier for you to use the dynamic features of these web pages, without having to provide the same information as you move from one page to another. You will find the use of these \u201csession cookies\u201d on several of our data access tools.<\/p><p>To protect your privacy, be sure to close your browser completely after you have finished conducting business with any website that uses cookies. If you are concerned about the potential use of information gathered from your computer by cookies, you can set your browser to prompt you before it accepts a cookie. Most Internet browsers have settings that let you identify and\/or reject cookies.<\/p><p><strong>Information from e-mail you send to us:<\/strong><\/p><p>If you decide to send us an e-mail message, the message will usually contain your return e-mail address. If you include personally-identifying information in your e-mail because you want us to address issues specific to your situation, we may use that information in responding to your request, but it will be destroyed when we complete our return correspondence. Also, e-mail is not totally secure against interception. Please send only information necessary to help us process your request.<\/p><p><strong>Voluntary Submission of Information:<\/strong><\/p><p>On some of our web pages we provide forms that let you voluntarily submit personal information (such as e-mail address or name). For example, this occurs when you are registering for various products. In those cases, all submitted information is used only for the expressed purposes for which it is intended and is not made available to any third party.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security policy Web Security Policy:For security purposes and to make sure our website remains available to all users, we use special software programs for monitoring network traffic to identify unauthorized attempts to upload or change information, or otherwise to cause damage to this government computer system. These programs collect no information that would directly identify [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-844","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/pages\/844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/comments?post=844"}],"version-history":[{"count":4,"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/pages\/844\/revisions"}],"predecessor-version":[{"id":848,"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/pages\/844\/revisions\/848"}],"wp:attachment":[{"href":"https:\/\/www.totalrelationshipmarketing.com\/index.php\/wp-json\/wp\/v2\/media?parent=844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}