Every computer connected to the Internet is provided with a domain name and an IP Address. When a visitor requests a web page from within the Storm Aviation website, our servers automatically identify and log the HTTP request that is made.
This information reveals nothing personal about you. In fact, the only information that we automatically gather and log is as follows: the IP address of the site that may have referred you; your IP address; the web page that you may have linked to us from, if any; the product identifier for version and make of browser (e.g. Internet Explorer 8); the operating system platform that you may be running (e.g. Macintosh or Windows); search words or terms that are passed from a search engine (e.g. Google or Yahoo).
Storm Aviation has found it advantageous to examine visitor traffic so that we can ensure maximum compatibility for the various browsers and operating systems that visit our site. By analysing visitation patterns, referring URLs and search engine terms, we can strategically enhance our exposure across the Internet.
When we provide services, we want to make them easy, useful and reliable. Where services are delivered on the internet, this sometimes involves placing small amounts of information on your device, for example, your computer or mobile phone. These include small files known as cookies. They cannot be used to identify you personally.
These pieces of information are used to improve services for you through, for example:
- recognising that you may already have given a username and password so you don’t need to do it for every web page requested
- measuring how many people are using services so they can be made easier to use
- analysing anonymous data to help us understand how people interact with our website so we can make it better
Learn how to remove cookies set on your device.
Third party cookies
We use a number of suppliers who may also set cookies on their websites’ on its behalf. The Storm Aviation website does not control the dissemination of these cookies. You should check the third party websites for more information about these.
|These cookies are used to collect information about how visitors use
our site. We use the information to compile reports and to help us improve
the site. The cookies collect information in an anonymous form, including the
number of visitors to the site, where visitors have come to the site from and
the pages they visited.
What other information does Storm Aviation request?
We may also request your email address or mailing address for the purposes of conducting a survey or to add you to our mailing list, or by your request to have someone contact you for additional information. Whenever we request the identity of a visitor, we will clearly indicate the purpose of the inquiry before the information is requested.
We enforce a strict ‘Anti-Spam’ policy that means we do not intend to sell, rent, or otherwise give your e-mail address to a third-party without your consent.
In addition, Storm Aviation will not send you email that you have not agreed to receive. If you are a member of our mailing list, you may be contacted with announcements, news, portfolio additions, and new products or services.
With each email sent, you have the option of ‘unsubscribing’ from our mailing list at any time, thereby disabling any further such email communication from being sent. If you wish to have specific communications with a member of the Storm Aviation staff, you will be required to provide specific information that will be routed to the appropriate contact within Storm Aviation.
Storm Aviation will only disclose your personal information or any of its log file information when required by law or in the good-faith belief that such actions are necessary.
Storm Aviation uses all reasonable precautions to keep the information disclosed to us secure. Storm Aviation reserves the right to transfer information in connection with the sale of all or part of the Storm Aviation capital stock or assets to any third party. Furthermore, we are not responsible for any breach of security or for any actions of any third parties that receive the information.