Turner Knowledge Network Privacy Policy

This Policy applies to Turner Knowledge Network (TKN) and its affiliated entities throughout the world. The User information supplied by users in the course of utilizing the system is in the custody of, and may be accessible to, TKN and its agents. This user information may include personal information. We are committed to protecting the personal information of the users. This Policy describes the personal information we may receive from users, the circumstances under which we may receive that information, the purposes for which it uses and shares that information, and how we safeguard that information.


Collection of Personal Information


The courses are delivered to users in an on-line, web-based environment that is provided and maintained by TKN and its agents. Depending on the particular service and configuration, the system may request, display, and/or store information about each user. This may include personal information; such as the user's name, address, phone number(s), and e-mail address (collectively, 'Personal Information'). Each user also defines or is assigned a unique user name for use of the services. User Personal Information collected in this manner may be stored, transferred, and accessed in the United States, or any other country in which TKN or its agents maintain facilities.


Use of Personal Information


TKN may use Personal Information to:

Additionally, users may display and use their own Personal Information to identify themselves to other users during collaborative sessions facilitated by the system.


TKN will not use Personal Information for any other purpose incompatible with the purposes listed above, unless the specific usage is required or authorized by the user, is in the vital interest of the user, or is necessary to comply with a legal obligation. Personal Information may be shared with TKN business affiliates in a manner consistent with the Policy.


Disclosure of Personal Information to Other Users


Depending on how the systems are configured and utilized by each user, the system may display Personal Information in a format that is visible to other users (e.g., during collaborative on-line sessions). We do not and cannot control or restrict access to a given user's Personal Information by other users if that access is enabled by the specific system configuration selected by a user. Users may also be able to restrict or modify the means by which their Personal Information may be visible to other users, as well as the amount of Personal Information displayed, depending on the configuration parameters.


Use of Personal Information by Third Parties


TKN may share Personal Information with third party agents who provide products and/or services; such as, web site hosting, information technology consulting, web site management, marketing, promotion, data analysis, audit, legal, administrative, back-up, and security services. We work to ensure that such third parties use the Personal Information only for the purposes for which we engage them and under privacy protections that are similar to what we maintain. In the event there is a change in corporate structure, including, without limitation, merger, consolidation, sale, liquidation, or transfer of substantial assets, we may, in its sole and absolute discretion, transfer, sell, or assign information in our possession, custody or control, including, without limitation, aggregated information and Personal Information, to one or more affiliated or unaffiliated third parties.


TKN may also disclose Personal Information in order to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal processes; (4) protect the rights, privacy, safety, or property of TKN, customers, users, clients, or the public; (5) enforce our license terms; and (6) permit us to pursue available remedies or limit the damages that we may sustain.


Use of "Cookies" and Other Tracking Technologies


TKN and its agents may collect certain technical and routing information about each user's computer to facilitate usage of the system. For example, we may log environmental variables; such as, browser type, operating system, CPU speed, and the Internet Protocol address of each user's computer. We use these environmental variables to facilitate and track usage of the system. We may also use such environmental variables to measure traffic and usage patterns for the system and, in certain cases, to bring opportunities of potential interest to the attention of users.


While it is possible that some data may be traceable to an individual, any such linked information will be treated in accordance with this Policy as long as it is so linked.


TKN uses "cookies" or similar technologies to store login and general information on users' computers. A cookie is a small amount of information that a web site transfers to a computer's hard drive. We use cookies to simplify users' access and to tailor the system to better align with the needs and interests of our users. In some cases, we may offer users the choice of having an ID or password stored in a cookie so that users do not need to re-enter it when they return to the system. No other site can read a cookie set by TKN, and we cannot read a cookie that another web site wrote to a user's computer. Most internet browsers are set to accept cookies. Users can reset browsers to refuse cookies and still use the system, although access may be slower and less convenient.


We also may collect data by using "pixel tags," "web beacons," "clear GIFs," or similar means (collectively, " tags") that allow us to know when users access the system. Through tags, we do not have access to personal information about individual users, but we obtain aggregate data (e.g., the IP address and the domain name, the portions of the system accessed, and the user's operating system, browser version, and the URL from which the user came) which can be used to enhance the system.


External Links


The system may include links to other web sites owned and/or administered by third parties and not controlled by TKN. Please note that we are not responsible for the collection, use, maintenance, sharing, or disclosure of data and/or information by such third parties. Once any user leaves the on-line environment in which TKN provides, the system (you can usually tell where you are by checking the URL in the location bar on your browser), use of any information provided by users is governed by the privacy policy of the operator of that particular site. That policy may differ from this Policy. We encourage each user to read the privacy policies of each web site that the user visits before submitting personal information. If the privacy policy of any of these web sites is not immediately accessible via a link from the web site's homepage, we recommend that users contact the web site directly for more information.


Security and Confidentiality


TKN takes appropriate and commercially reasonable technical and organizational measures to protect Personal Information against unauthorized access, accidental loss or damage, and unauthorized destruction. TKN and affiliate employees who have access to confidential, proprietary, or personal information are required to treat it confidentially, and are not permitted to use it for purposes unrelated to the business, nor to disclose it to unauthorized third parties. We use technology to protect the Personal Information that users supply in the environment. Unfortunately, however, no security system or system of transmitting data over the Internet can be guaranteed to be entirely secure. Users who have reason to believe that their interactions with TKN (including their use of the system) are no longer secure are strongly encouraged to notify us of the problem.


Data Retention


We will not keep Personal Information longer than as necessary for the fulfillment of the purposes outlined herein. We seek to avoid the retention of unnecessary or duplicative information.


Data Integrity


Wherever possible, we take reasonable steps to ensure that the Personal Information it maintains is reliable for, and relevant to, its intended use. We also endeavor to ensure that such Personal Information is accurate, complete, and current.


Access and Correction


For the system, user information is supplied by the users themselves. Depending on the configuration of the system, users may have the ability to supply, correct, or remove their own Personal Information. Where required by applicable law, we provide users with the right to access and correct their Personal Information that we control. For information about how to exercise these rights, please contact us.