ByteScout is committed to protecting your privacy. The following discloses the information gathering and dissemination practices for this Web site: www.ByteScout.com.
Information Automatically Logged
We may use your IP address to help diagnose problems with our server, to administer our Web site, to fight spam messages sent through a forms on the web-site. This information can also be used to allow us to determine the statistical usage of the Web site.
The referring URL (address of a web page you left before coming to the www.ByteScout.com web page, if any) is logged whenever you view a page on the www.ByteScout.com website. This allows us to determine which areas on the Web Site are more popular than others and paths taken to reach each page. It also allows us to measure the effectiveness of promotional programs we may be running on the Web site.
All such information is gathered globally not individually and no such information is linked to any identifying information about you as a visitor.
ByteScout has partnered with BlueSnap and MyCommerce e-commerce providers to accept your orders. Both BlueSnap and MyCommerce provide secure order forms for you to buy our products. When you place an order, BlueSnap or MyCommerce collects contact information (like your email address), and financial information (like your credit card number). Contact information from the order forms is used only to get in touch with you when necessary. This includes sending you the product(s) you ordered, notifying you about new versions of the product(s) you ordered, and contacting you if there is a problem with your order. Financial information that is collected is used to bill you for the order.
We allow our visitors to sign up for our free newsletter(s) by providing an email address. The email address you provide is used only to send you the the newsletter(s).
This site contains links to other sites. ByteScout is not responsible for the privacy practices or the content of these web sites.
This site has security measures in place to protect the loss, misuse, and alteration of the information under our control.