This site is operated by the JTI Foundation.
By using this site you accept the Privacy Statement and Terms & Conditions set forth below. If you do not agree with these policies, discontinue using this site immediately.
Security
This website takes every precaution to protect our users’ information. When users submit sensitive information via the website, their information will be protected both online and offline.
Cookies
A cookie is a piece of data stored on the user’s computer containing information about the user. Usage of a cookie is in no way linked to any personally identifiable information while on our site. Once the user closes their browser, the cookie simply terminates. If a user rejects the cookie, they may still use our site. The only drawback to this is that the user will be limited in some areas of our site.
Log files
We use IP addresses to analyze trends, administer the site, track users’ movement and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.
Contact (e-mail)
The Contact page of this site allows you to send us e-mails. We will retain your e-mail address and any other information you send us if we so chose. This information is retained only to enable us to communicate with you, but if you wish us to delete your e-mail address or any other information that you have sent us, send us an e-mail requesting that we delete this information and we will respect your wishes.
Notification of changes
If we decide to change our privacy policy, we will post those changes on our Homepage so our users are always aware of what information we collect, how we use it, and under circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was securely collected.