Privacy Policy

  1. The Bold Center recognizes that the privacy and confidentiality of a person’s personal information is important. All personal information is managed according to the Alberta Freedom of Information and Protection of Privacy Act. This means that:
    1. You will be informed, at the point of collection, that your personal information is being collected and the purpose for which it is being collected;
    2. You have a right of access to your information;
    3. You have control over how the Bold Center obtains, uses, and discloses your personal information;
    4. All uses of information are subject to you not having refused or withdrawn consent, unless disclosure is made for legal purposes.
  2. Even if you do nothing more during your visit than browse through the web site, read pages, or download information, please be aware that the Bold Center automatically gathers and stores certain information about your visit. This information does not identify you personally. The Bold Center collects and stores only the following information about your visit:
    1. The Internet domain and Internet Protocol (IP) address from which you access the Bold Center‘s web site;
    2. The type of browser and operating system used to access the Bold Center‘s site;
    3. The date and time you access the Bold Center‘s site;
    4. The pages you visit on the Bold Center‘s site; and
    5. \If you are linked to the Bold Center web site from another web site, the address of that web site.
  3. The Bold Center uses this information to help us make our site more useful to visitors, to learn about the number of visitors to our site and the types of technology our visitors use. The Bold Center does not track or record information about individuals and their visits.
  4. The Bold Center web site may contain links to other sites. The Bold Center is not responsible for the content and privacy practices of other web sites and the Bold Center encourages you to examine the privacy policy and disclaimer of each site and make your own decisions regarding the disclosure of your personal information to that site.
  5. The Bold Center uses electronic “cookies. ” A cookie is a small amount of data that is transferred to your browser by a web server. It cannot be executed as code or deliver viruses. A session ID, along with time and date and other information may be placed in the cookie. This information is used to provide the user with an enriched experience while using the Bold Center‘s web site. Once the user leaves the Bold Center‘s web site, the session is considered done and the cookie expires. The Bold Center does not build profiles of users through the use of cookies and does not attempt to track individual users through the use of cookies. In order for a cookie to be written to your computer, cookies must be enabled by your browser. Most browsers are initially set to accept cookies. You can set your browser to notify you when you receive a cookie, giving you the chance to decide whether to accept it. If you decide to refuse a cookie, you may find that the web site does not behave as designed.
  6. If you choose to provide the Bold Center with personal information in an e-mail or by filling out an electronic form and submit it to the Bold Center through our web site, the Bold Center will use that information to respond to your message and to assist us to provide you the requested information or service.
  7. E-mail messages are subject to the Act. The personal information you share with the Bold Center is provided only to those areas that are required to carry out the business that relates to you. All e-mail messages sent or received are the property of the Bold Center and may be accessed by department heads or their delegates without further consent of the author. All e-mail messages required to be retained by law will be printed and maintained through a records management process.
  8. Security measures are implemented in order that web services remain available to all users. The Bold Center computer system employs software programs to monitor network traffic to identify attempts to tamper with information, or to otherwise cause damage.