This policy explains what information we gather when you visit the IIC web site, and explains how that information is used.
It is important for you to appreciate that the web site provides extensive links to other independent sites. This policy applies only to direct accesses to the IIC website - URLs containing iiconservation.org. You will need to consult the appropriate information on other sites for information on their policies.
Personal data shared with us by you (such as your email address) may be transferred to third party service providers such as MailChimp or Campaign Monitor, who we work with to help us deliver information to you more effectively and efficiently. These third party providers may transfer your personal data for the purposes of providing services to us. These third parties may also send you information about the IIC on our behalf, such as details about our publications or notices of our annual general meeting. You have control of whether your data can be shared with third parties through the settings in your account page.
Cookies In Use on This Site
Cookies and how they Benefit You
Cookies are small text files that are placed on your computer or mobile phone when you browse websites
Our cookies help us:
- Make our website work as you'd expect
- Remember your settings during and between visits
- Improve the speed/security of the site
- Allow you to share pages with social networks like Facebook
- Personalise our site to you to help you get what you need faster
- Continuously improve our website for you
- Make our service more efficient (ultimately helping us to offer the most useful information to our members)
- Collect any personally identifiable information (without your express permission)
- Collect any sensitive information (without your express permission)
- Pass data to advertising networks
- Pass personally identifiable data to third parties
- Pay sales commissions
You can learn more about all the cookies we use below
More about our Cookies
Website Function Cookies
Our own cookies
- Making our shopping basket and checkout work
- Determining if you are logged in or not
- Remembering your search settings
- Remembering if you have accepted our terms and conditions
- Allowing you to add comments to our site
- Tailoring content to your needs
There is no way to prevent these cookies being set other than to not use our site.
Third party functions
Disabling these cookies will likely break the functions offered by these third parties
Social Website Cookies
So you can easily 'Like' or share our content on the likes of Facebook and Twitter we have included sharing buttons on our site.
Cookies are set by:
The privacy implications on this will vary from social network to social network and will be dependent on the privacy settings you have chosen on these networks.
Visitor Statistics Cookies
- Google Analytics
Turning Cookies Off
You can usually switch cookies off by adjusting your browser settings to stop it from accepting cookies (Learn how here). Doing so however will likely limit the functionality of our's and a large proportion of the world's websites as cookies are a standard part of most modern websites
It may be that you concerns around cookies relate to so called "spyware". Rather than switching off cookies in your browser you may find that anti-spyware software achieves the same objective by automatically deleting cookies considered to be invasive. Learn more about managing cookies with antispyware software.
The cookie information text on this site was derived from content provided by Attacat Internet Marketing http://www.attacat.co.uk/, a marketing agency based in Edinburgh. If you need similar information for your own website you can use their free cookie audit tool.
In common with most web sites, this site automatically logs certain information about every request made of it (see below for more details). This information is used for system administration, for bug tracking, and for producing usage statistics. The logged information may be kept indefinitely.
Relevant subsets of this data may be passed to computer security teams as part of investigations of computer misuse involving this site or other computing equipment. Data may be passed to the administrators of other computer systems to enable investigation of problems accessing this site or of system misconfigurations. Data may incidentally be included in information passed to contractors and computer maintenance organisations working for the IIC, in which case it will be covered by appropriate non-disclosure agreements. Otherwise the logged information is not passed to any third party except if required by law. Summary statistics are extracted from this data and some of these may be made publicly available, but those that are do not include information from which individuals could be identified.
You should appreciate that a log is a record of what a server sees, not necessarily what was initially sent. If a request is sent via a proxy the log file will show the proxy's address. If someone has forged your address the log file will show your address.
The following data is automatically logged for each request:
The name or network address of the computer making the request. Note that under some (but not all) circumstances it may be possible to infer from this the identity of the person making the request. Note also that the data recorded may be that of a web proxy rather than that of the originating client
The username, when known during authenticated (logged in) access to the site
The date and time of connection
The HTTP request, which contains the identification of the document requested
The status code of the request (success or failure etc.)
The number of data bytes sent in response
The contents of the HTTP Referrer header supplied by the browser
The content of the HTTP User-Agent header supplied by the browser
Logging of additional data may be enabled temporarily from time to time for specific purposes. In addition, the computers on which the web site is hosted keep records of attempts (authorised and unauthorised) to use them for purposes other than access to the web server. This data typically includes the date and time of the attempt, the service to which access was attempted, the name or network address of the computer making the connection, and may include details of what was done or was attempted to be done.
IIC has made every effort to identify the copyright holder of all images used on the IIC website as indicated in the caption to each image. Please contact IIC if you believe that you have copyright title to an image used on the IIC website that has not been acknowledged. We will remove the image from the site pending investigation of copyright status.