This section outlines the Web Site Privacy and Security Notices, Web Site Disclaimer, and Accessibility Statement for Uncle Jim's Web Designs and Tutorials.
Property Ownership and Rights
All material on this site is owned by its prospective developers, who have final authority of how it is used, when it is used, and who it is used by. Unless otherwise Uncle Jims Web Designs owns all material on this site and enjoys full rights and priviledges afforded as the owner.
Web Design Templates
Design templates are offered as free downloads from this site. They may be used freely and without written permission from the user. They remain the property of Uncle Jims Web Designs and are offered for use only. No one may claim any pictures, images or designs as their own.
Various coding in different languages and formats are offered as free downloads from this site. They may be used freely and without written permission from the user. They remain the property of Uncle Jims Web Designs and are offered for use only. No one may claim any coding from this site as their own. In addition, no one is authorized to remove any copyright or other notices included in the original coding.
Web Site Privacy Notice
Uncle Jims Web Designs uses advanced technologies as part of its core applications. Cookie technology may be implemented in some areas of this site. At no time is private information you have given us, whether stored in cookies (persistent) or elsewhere, shared with third parties that have no right to that information. If you do not wish to have persistent cookies stored on your machine, you can turn them off in your browser. However, this may impact the functioning of some areas of this site. Below are examples of what we do with your information:
Reading or Downloading Web Site Information
We may collect and store information for statistical purposes. For example, we may count the number of visitors to the different pages of our Web site to help make them more useful to visitors. This information does not identify you personally. We automatically collect and store only the following information about your visit:
When Sending Us E-Mail
By sending us an electronic mail (e-mail) message, you may be sending us personal information such as your name, address, and e-mail address. We may store your name, address, and e-mail address of the requester in order to respond to your request or otherwise resolve the subject matter of the e-mail. Under limited circumstances, including requests from Congress or private individuals, we may be required by law to disclose the information you submit.
Some areas of our Web site may ask visitors who request specific information to fill out a registration form. For example, vendors looking for marketing opportunities by visiting our Services and Support for Internet Service site may be asked to "register" to obtain email notices of business opportunities. Other information collected at Web sites through questionnaires, feedback forms, or other means, enables us to determine visitors' interests, with the goal of providing better service to our customers.
For site security purposes and to ensure that this Web service remains available to all users, our computer system employs software programs that monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals evidence of possible abuse or criminal activity, such evidence may be provided to appropriate law enforcement officials. Unauthorized attempts to upload or change information on Uncle Jims Web Designs sites or servers are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996.
Web Site Disclaimer
Website Security Measures
Uncle Jim's Web Designs utilizes security measures, consistent with current information practices, to protect its website, email, and mailing list servers. These measures include technical, procedural, monitoring and tracking steps intended to protect data from misuse, unauthorized access or disclosure, loss, alteration, or destruction.
Anyone requiring further information may contact the for clarification.