About This Information
The information on this page is collected from 3rd party components of this website which report their privacy related capabilities to this system. As this website requires 3rd party components to support its reporting system, and only displays information from enabled components. Components that are disabled are not functioning on this website and hence there is no interaction with the users and website visitors.
Website Core Capabilities
All requests to this website start a session which stores the IP address in the session data and creates a session cookie in the user's browser. The IP address is used as a security measure to help protect against potential session hijacking attacks and this information is deleted once the session has expired and its data purged. The session cookie's name is based on a randomly generated hash and therefore does not have a constant identifier. The session cookie is destroyed once the session has expired or the user has exited their browser.
This website's logging system records the IP address of the visitor which leads to a message being written to its log files. These log files are used to record various activity on this site, including information related to core updates, invalid login attempts, unhandled errors, and development information such as the use of deprecated APIs. The format of these log files may be customized.
Authentication Cookie
The "Remember Me" feature, creates a cookie in the user's browser if a "Remember Me" checkbox is selected when logging into the website. This cookie can be identified with the prefix `remember_me` and is used to automatically log users into this website when they visit and are not already logged in.
CAPTCHA - Invisible reCAPTCHA
The Invisible reCAPTCHA plugin integrates with Google's reCAPTCHA system as a spam protection service. As part of this service, the IP address of the user answering the captcha challenge is transmitted to Google.
Privacy
In order to process information requests, information about the user must be collected and logged for the purposes of retaining an audit log. The request system is based on an individual's email address which will be used to link the request to an existing site user if able.