Late Night PC Service is a small business based in Windsor, Ontario, Canada. This web site exists primarily to serve the needs of the business. Part of running an interactive and feature full web site includes collecting information from and about visitors. Information is generally collected from visitors to the website to help ensure orderly performance of the site. Some of this information is used to improve the user experience or determine how to improve the site. When a user requests a response or more information, then information they've provided will be used to contact that user.
We collect some information from all visitors, most of this information is not personally identifiable or private information. The most basic pieces of information include the visitor's IP address, the browser and operating system identification, time and date. This is required in order to operate any website and prevent abuse.
In order for certain features to work correctly, the site also requires visitors to allow cookies (both setting and sending). Part of the functionality of a cookie involves recording some user activity on this site (cookies cannot and do not collect information about any sites other than those operated by Late Night PC Service). See this page for more detailed information on cookies in general.
While Late Night PC Service makes all reasonable efforts to protect personal information there is no guarantee of privacy. Specifically, information such as user affiliations may be disclosed in cases where it is relevant to discussion and the user has not made such disclosure. An example would be abusive comments on a blog post about Telus which are made from a Telus IP address. In this case the user can expect to have the apparent affiliation disclosed.
This site may display advertisements. Advertisements are often hosted by a third party. While Late Night PC Service makes every effort to ensure that advertising is reasonable and non-offensive, the third party advertiser is responsible for the content of the advertisements. Since visitors will see advertisements that the site owner can not, concerns may be reported using the contact form on this site.
Visitor's personal information collected here is not passed on without direct consent. User lists are not sold or passed on.
How we store information
Collected information is stored on the web server in files and databases and on backups which are made periodically. Private information, such as passwords, are encrypted or hashed to prevent unauthorized access.
Specific examples of use of personal information
This site may operate a mailing list or newsletter which users have the choice of receiving or opting out of.
Responses to requests for information
If a user requests products or services from Late Night PC Service via the forums, contact page, or other methods then that user's personal information is used to deliver the product or service and facilitate other related communication.
This site gathers information for the purpose of analyzing site performance and user engagement. Information used in these cases is used in aggregate and not intended to identify individual users. Third party software and services (such as Google Analytics or awstats) may be used to help in statistics gathering and analysis. These software and services may gather additional information and have their own privacy policies.
Analysis of Site Misuse or Abuse
Every website on the public Internet is exposed to numerous threats which intend to disrupt the services the site provides or use the resources of the server the site runs on for purposes other than those the legitimate owner intends. In defending the site against such attacks, it is often necessary to analyze server logs and other data gathered by the website. The intent of this analysis is to ensure correct operation for legitimate users but the data analyzed may include personal information which was gathered for purposes listed elsewhere in this document. As much as possible, this information is anonymized except in cases where the information is used to identify an attacker or site abuse.
The preceding paragraph basically means that a user abusing the website loses their expectation of privacy. For example, if someone attempts to use the site for a cross-site scripting attack then they will not be treated as a legitimate user of the site would.