Privacy & Security
NEA Clinic and its Charitable Foundation has created this privacy statement in order to demonstrate our firm commitment to privacy. The following discloses our information gathering and dissemination practices for these websites: www.neabaptistclinic.com and www.neafoundation.com
Use of IP Addresses
An IP address is a general representation of where you are coming from by domain name or number (i.e. aol.com, yourfirm.com, or a numeric equivalent like 184.108.40.206). We collect aggregate information site-wide, including anonymous site statistics, by logging IP addresses and/or domain names. This helps us diagnose problems with our server and administer our Web site. We do not link IP addresses to anything personally identifiable. This means that a user’s session will be tracked, but the user will remain anonymous. We review and discard the information in some cases (e.g. IP address logs for file transfers), while in others we may use the information to tailor our users’ web experience, or generate anonymous statistics.
On certain pages, such as the Clinical Trials Information Request Form or the Employment Opportunity Application, we give users the option of providing us with names, addresses, phone numbers, email addresses, and other personal information. This personal information is only gathered by us with the user’s knowledge and active permission and participation.
The user may choose to limit the amount of information collected at the time of submission. We use customer contact information from the contact forms to send users information they have requested about our organization.
This information is not retained or used for any other purpose. No information is shared with third-parties.
This site contains links to other sites. While we do our best to select only credible, responsible websites as links, NEA Baptist Clinic is not responsible for the privacy practices or the content of such Web sites.
This site has security measures in place to protect the loss, misuse and alteration of the information under our control, including firewalls, access restrictions, and password protection.