Thank you for visiting the human trafficking online and reading our website's privacy policy. Our Privacy Policy explains how we handle the Personal Information (PII) that you provide to us when you visit us online for information retrieval or transaction.
PII contains information that is personal in nature and can be used to identify you. You can send PII to us if you send us an e-mail message or request for information, if you complete a questionnaire or customer satisfaction survey, if you are in a research study, etc. You do not need to register or register. PII to visit our website. We collect some technical information that PII does not contain when you visit us to make your visit seamless.
PII contains information that is personal in nature and can be used to identify you. You can send PII to us if you send us an e-mail message or request for information, if you complete a questionnaire or customer satisfaction survey, if you are in a research study, etc. You do not need to register or register. PII to visit our website. We collect some technical information that PII does not contain when you visit us to make your visit seamless.
Site Security
The department takes the security of all personal data very seriously. We take precautions to ensure the security, confidentiality, and integrity of the information collected on this site. These measures include access controls designed to limit access to the information to what is necessary to fulfill our mission. We also use a variety of security technologies to protect the information stored on our systems. We regularly test our security measures to ensure that they remain operational and effective.
For the sake of website security and to ensure that this service remains available to all users, this government computer system uses commercial software programs to monitor network traffic and unauthorized attempts to upload or modify the information or otherwise cause damage.
With the exception of authorized law enforcement agencies, no further attempts are made to identify individual users or their usage habits. Raw Data Logs are not used for any other purpose and are intended for periodic destruction in accordance with National Archives and Records Administration guidelines.
Unauthorized attempts to upload or modify information about this service are strictly prohibited and may be punished under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.