Sentences with phrase «server log information»

We also automatically collect information about your computer browser type and operating system, websites you visited before and after visiting our website, standard server log information, Internet Protocol (IP) addresses, GPS location data, mobile phone service provider, and mobile phone operating system.
Log Files When visitors enter and navigate through the pages of our site, our server logs information, including the internet address of the server or computer contacting us, the date and time, the referring site and its URL, as well as the visitor's browser, operating system, and screen resolution.
Log Files When visitors enter and surf through the pages of our site, our server logs information including the internet address of the server or computer contacting us, the date and time, the referring site and its URL, as well as the visitor's browser, operating system, and screen resolution.

Not exact matches

Pursuing Retirement collects no personal information except for standard logs generated by our web server.
Generic information from server logs is collected by the Beverages Council and used to track the number of hits to the site.
Generic information from server logs is used to track the number of hits to the site and to find out what types of browser software and operating systems visitors use.
When you visit our Site, we may automatically track and collect the following categories of information: (1) web beacons; (2) IP addresses; (3) log files; (4) domain servers; (5) types of computers accessing this Site; and (6) types of web browsers used to access this Site (collectively «Traffic Data»).
Arsenal FC Blog and its authorized agents automatically receive and record certain «traffic data» on their server logs from your browser including your IP address, Arsenal FC Blog cookie information, and the page you requested.
MomLifeTV automatically receives and records information on our server logs from your browser, including your IP address, our cookie information, the page you request and how long and often you watch our show.
Selective Mutism Association collects certain information from and about its users three ways: directly from our Web Server logs, the user, and with Cookies.
Our server logs automatically collect information, such as your IP address, your browser type and language, and the date and time of your visit, which helps us to track users» movements around our online Services and to understand trends.
During every visit to the EliteSingles service, utilization information is forwarded by your Internet browser and stored in log files called Server Log Fillog files called Server Log FilLog Files.
During every visit to the EliteSingles service, utilisation information are forwarded by your Internet browser and stored in log files called Server Log Fillog files called Server Log FilLog Files.
During every visit to the ELITESINGLES service, utilisation personal information are forwarded by your Internet browser and stored in log files called Server Log Fillog files called Server Log FilLog Files.
Most web servers routinely maintain access logs with a portion of this information, which can be used to get an overall picture of what pages are popular, what other sites link to this one, and what web browsers people are using.
Merit Software also automatically receives and records information on our server logs, such as the browser you are using, your IP address, and the pages you requested.
The web server logs also may record information such as the address of the web page that linked you to our site and the IP address of the device you use to connect to the Internet.
In conjunction with obtaining information through cookies, our web servers may log details such as your operating system type, browser type, domain, and other system settings, as well as the language your system uses and the country and time zone in which your device is located.
Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Website, and the Websites visited just before and just after our Website.
and Web server logs to collect information about how our Web site is used.
Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Web site, and the Web sites visited just before and just after our Web site.
Site users are prohibited from violating or attempting to violate the security of this Site, including without limitation: (1) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (2) using this Site for unintended purposes or trying to change the behavior of this Site; (3) attempting to probe, scan or test the vulnerability of a system or network or breach security or authentication measures without proper authorization; (4) attempting to interfere with service to any user, host or network, including without limitation, via means of submitting a virus to this Site, overloading, «flooding,» «spamming,» «mailbombing» or «crashing»; (5) forging any TCP / IP packet header or any part of the header information in any e-mail or newsgroup posting; and (6) forging communications on behalf of this Site (impersonating this site) or to this Site (impersonating a legitimate user).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
The Humane Education Network and the Animal Welfare Institute do not share personal information provided explicitly through this website, or gathered implicitly via web server log files, with any other entity for any purpose whatsoever, with the limited exception stated below for announcing the winners of the annual essay contest.
As part of court filings issued last month in Washington, Square Enix accuse the fifteen of logging into the servers where the demo was hosted using the access information of an Italian games magazine (GMC), where they found the preview build of the game, copied it and uploaded it onto the internet.
violate or attempt to violate the security of the Site, including, without limitation: (i) accessing data not intended for you or logging onto a server or an account that you are not authorized to access, (ii) trying to change the behavior of the Site, (iii) attempting to probe, scan, or test the vulnerability of a system or network, or to breach security or authentication measures, (iv) attempting to interfere with service to any user, host, or network, including, without limitation, via means of submitting malware to the Site, overloading, flooding, spamming, mailbombing, or crashing, (v) forging any header or part of the header information in any email or posting, or (vi) impersonating the Michaels website or impersonating another user;
Website Usage Information TreeHugger.com tracks navigational data (log files, server logs, click - stream) and information about how our Website is used by you (through cookies, Internet tags, or weInformation TreeHugger.com tracks navigational data (log files, server logs, click - stream) and information about how our Website is used by you (through cookies, Internet tags, or weinformation about how our Website is used by you (through cookies, Internet tags, or web beacons).
I mean, there's no reason why... Except for the ease of the troubleshooter, that if your server needs to log everything that everybody connected to it does, or that your website needs to save information about visitors, or that your app needs to be tracking information about them.
Each time you go to a website that features Google's ads, your computer sends a request to Google's servers and that «hit» goes into their logs, along with the information about what site you were visiting, when you visited and what ad was served.
While our Web server is able to log certain technical aspects of your communications with our website, none of this data is associated with personal information about you.
A few examples of personal information frequently held by third parties include medical, psychological, and counselling records, financial records, emails and electronic appointment calendars that are stored on third - party computer servers, and web server and ISP logs that reveal the web sites we have visited.
Blue Ribbon Driving School collects certain information from and about its users three ways: directly from our Web Server logs, the user, and with Cookies.
Additionally, for systems administration, detecting usage patterns and troubleshooting purposes, our web servers automatically log standard access information including browser type, access times / open mail, URL requested, and referral URL.
Enable this to include debug information in the various Plex Media Server logs.
Unfortunately, their privacy policy also reveals that they do in fact keep logs of some information, including times when a user is connected to the service, their choice of servers and total amounts of data transferred.
This software was collecting sensitive personal information from users including location data, text messages, and call logs, and sending it to servers in China.
IT Server Technician ITAC Solutions, Akron, OH 2/2009 — 5/2014 • Installed and maintained computer systems such as desktops and peripherals • Ascertained that both software and hardware were updated and installed properly • Assisted in performing troubleshooting activities on systems, ensuring that downtime was minimized • Provided users with information on how to handle complex computer commands • Provided support in creating user documentation and ensured that proper support logs were maintained
Similar to other commercial web sites, CN Video Resumes» web site utilizes a standard technology called «cookies» and server logs to collect information about how our web site is being used.
Similar to other commercial websites, our website utilizes a standard technology called «cookies» (see explanation below) and server logs to collect information about how our site is used.
The hosting service, as an agent of Healthy Families, writes to server log files to record user transactions and utilizes analysis software to collect site usage information.
This information is typically stored on your Web site's server as a «log» file.
This information, which is automatically received by HomeGauge, is recorded on the Company's server logs and is used to customize the content you see, to fulfill your requests for services, and for research and informational purposes.
a b c d e f g h i j k l m n o p q r s t u v w x y z