Friday, April 12, 2024

Terms of Service

The program code and other information contained herein is not for public release, and includes confidential and proprietary information owned by Don Burk. This program code and other information is transmitted solely for the purpose of executing program code on your computer, and for no other purpose. As recipient, you understand that reproduction, disclosure, and reverse engineering, in whole or in part, are all prohibited unless with prior explicit written consent of Don Burk. By receiving this program code, you agree to use it for this sole purpose and no other, and you agree to abide by these conditions of confidentiality. Program code, documentation, and all other information Copyright 2002-2024, Don Burk. All rights reserved. Protected by copyright and license restricting use, copying and distribution. This software is licensed, not sold, for use only under expressed written consent from Don Burk. or its authorized agents. This software is protected by United States copyright law. Unauthorized reproduction or distribution may be subject to civil and criminal penalties and is strictly prohibited. We reserve the right to pursue any unauthorized use of this software to the fullest extent possible.

Collected Information:

We require customers who register to use the services offered on our Site (collectively, the "Service") to give us contact information, such as their name, company name, address, phone number, and e-mail address, and financial qualification and billing information, such as billing name and address, credit card number, and the number of users within the organization that will be using the Service. At the time you express interest in attaining additional information, or when you register for the Service, we may also ask for additional personal information, such as title, department name, fax number, or additional company information, such as number of employees. Customers can update or remove their personal information at any time by logging into the Website and editing their Personal Information within Setup. Customers can view their updated profile to confirm their edits have been made.

Customers of the Service will be using the Site to host data and information ("Data"). will not review, share, distribute, print, or reference any such Data except as provided in the Subscription Agreement, or as may be required by law. Individual records may at times be viewed or accessed only for the purpose of resolving a problem, support issue, or suspected violation of the Subscription Agreement, or as may be required by law. Of course, customers are responsible for maintaining the confidentiality and security of their user registration and password. may also collect certain information from visitors to and customers of the Site, such as Internet addresses. This information is logged to help diagnose technical problems, and to administer our Site in order to constantly improve the quality of the Service. We may also track and analyze non-identifying and aggregate usage and volume statistical information from our visitors and customers and provide such information to third parties

Security Statement utilizes some of the most advanced technology for Internet security available today. When you access our site using Microsoft Internet Explorer versions 5.5 or higher, Secure Socket Layer (SSL) technology protects your information using both server authentication and data encryption, ensuring that your data is safe, secure, and available only to registered Users in your organization. Your data will be completely inaccessible to your competitors. provides each User in your organization with a unique user name and password that must be entered each time a User logs on. issues a session "cookie" only to record encrypted authentication information for the duration of a specific session. The session "cookie" does not include either the username or password of the user. does not use "cookies" to store other confidential user and session information, but instead implements more advanced security methods based on dynamic data and encoded session IDs. In addition, is hosted in a secure server environment that uses a firewall and other advanced technology to prevent interference or access from outside intruders.