Privacy Policy Privacy Policy

ToxStrategies, Inc. (owner of provides this Web site as a public service. We do not collect any personally identifiable information (PII) about you when you visit this website unless you choose to provide that information to us. We do collect some data about your visit to our Web site to help us better understand how the public uses the site and how to make it more helpful. The site never collects information for commercial marketing or any purpose unrelated to its functions.

Type of Information Collected

When you visit any Web site including, certain information about your visit can be collected. This site automatically collects and stores the following type of information about your visit:

  • Internet address and domain from which you visited the
  • Information about the operating system and browser used
  • Date and time of the visit
  • Pages visited
  • Files Downloaded (if registered to download data)

This information is used to measure the number of visitors to the various sections of our site and improve organization, coverage, system performance or problem areas.

Personally Identifiable Information (PII)

If you choose to register to download data, we will collect PII. If provided, PII is maintained in a secure database. Third party contractors may have access to this information in order to provide a response to a question or comment or to troubleshoot an issue with the site. These contractors are held to strict policies to safeguard the information. We do not give, share, sell, or transfer any PII to a third party unless required by law.


ToxStrategies, Inc. maintains this site. For site security purposes and to ensure that this service remains available to all users, we use software programs to monitor traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Causing damage to a website is a violation of U.S. law and is subject to criminal prosecution in federal court. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from logs may be used to help identify an individual that attempted to cause harm to the Site.