WEN Technology, Inc. is constantly striving to build long lasting relationships with you, our customers and business partners. In our effort to provide excellent service, we occasionally require information about you, such as your name and e-mail address, when you visit our site. This is necessary for access to particular areas, correspondence, providing subscriptions, and so forth. WEN Technology, Inc. respects your right to privacy and will let you know why we need such information and how it will be used.
- COMMITMENT TO PRIVACY. WEN Technology, Inc. is committed to complying with relevant laws and respecting high standards in handling our own and our clients' data. We recognize the importance of protecting personal data and individual privacy and would like to assure you that we will not collect personal information from you unless you provide it to us and will not provide or sell your name and address to outside vendors. Your information will be protected as described unless the specific web page says otherwise.
- OPT-OUT POLICY. Users are provided with the opportunity and ability to "opt out" of either providing personal or professional information to us or receiving communications from our Partners and us. We respect your right to privacy and offer you the opportunity to browse our Site without the need to provide private information, unless specifically required.
- SITE STATISTICS. WEN Technology, Inc. intends to give you as much control as possible over your personal information. However, we do keep track of the domains that users visit. As you browse our Site, web servers anonymously collect information about your visit, not about you personally. We monitor statistics such as how many users visit our site and what pages they visit, from which domains users come, and which browsers are used to visit our site. We analyze this data to allow us to constantly improve the value of the Web site and to monitor its performance.
- SECURITY. Our Web site logs Host Names and IP addresses (when the Host Name is not available) for systems administration and security purposes. These logs are monitored and analyzed to maintain systems and information security and allow us to constantly improve the value and the availability of the Web content.