EU laws require that you be told that
EU laws also require that anyone who has access to any such data within the UK shall
EU laws require that you be allowed to see any data that you have supplied to the database and that you be allowed to correct it if incorrect and to leave the system and have the data deleted unless the data is required to be stored.
The website and database are operated by 3dna, Corp., Los Angeles, CA 90071 whose data privacy statement includes the following:
When you use the Services, we may send cookies - small text files containing alphanumeric characters - to your computer to identify your browser and help enhance your experience with the Services. You can set your web browser to refuse all cookies or to indicate when a cookie is being sent. Some features of the Services may not function properly if the ability to accept cookies is disabled. We may use tiny images known as clear GIFs to track behavior of users, including statistics on who opens our emails.
Our servers automatically record certain log file information reported from your browser when you access the Services. These server logs may include information such as which pages of the Service you visited, your internet Protocol ("IP") address, browser type, and other information on how you interact with the Services. These log files are generally deleted after one week.
3dna uses Google Analytics to help us understand use of our Services.
Financial information connected to payments may be collected or stored by a third-party payment processor and is subject to their terms and policies.
Your account is protected by a password for your privacy and security. You must prevent unauthorized access to your account and Personal Information by selecting and protecting your password appropriately and limiting access to your computer or device and browser by signing off after you have finished accessing your account.
We endeavor to protect the privacy of your account and other Personal Information we hold in our records, but unfortunately, we cannot guarantee complete security. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time.