Online Customer Service and Alternatives
If you prefer to request information from us in person, you may do so via email, postal mail or by telephone. Our goal here is to provide you with a more convenient and efficient means to interact with us.
Collection and Use of Information – Information Collected and Stored Automatically by Cookies
BIA may use “cookies” to gather information about your visit automatically in a standard log file. Cookies are simple test files stored on your computer by your web browser. The information we collect never identifies you personally and consists of only the following items:
The Internet domain (for example, “xcompany.com” if you use a private Internet access account, or “your school.edu” if you connect from a university’s domain) from which you access the web site;
The IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access the web site; and the date and time of your access.
Although subject to change, we currently use this information to gather statistics about the amount of use the site receives. We do not automatically record information about you as an individual. We do not currently share, sell, or otherwise disseminate the collected information.
Information You Provide
Through our web site, you may request to be added to certain lists, or may complete forms for various purposes. Information we collect from you through the internet is treated the same as information you submit to us on a hard copy.
If you choose to provide us with personal information we use that information to respond to your message and to help us facilitate your request. We intentionally share the information you provide with another agency only if your inquiry relates to that agency, or if required by law.
Although we cannot guarantee your information will remain secure from outside threats, we have taken precautions to safeguard the integrity of our computer systems and networks. These steps include, but are not limited to, individual authentication, the security of transmitted data, security monitoring, auditing, and encryption of your information. Security methods and measures have been integrated into the design, implementation and day-to-day practices of the entire government process.
External Links Disclaimer
This policy may be updated or revised from time to time, so please check back with us periodically in order to receive notice of any substantive changes to the manner in which the information you disclose on this web site may be collected, used or disseminated.