Group 8

Privacy Policy

The The Energy Loop Portal hereinafter referred to as the Portal or The Energy Loop Portal, is committed to protect the rights of all its users. We hereby commit to keep critical information secret. The following announcement has been prepared to illustrate the mechanisms we follow in collecting and publishing information on the Portal.

1. Collecting and Using Information:

Our servers automatically gather the IP addresses of Portal users. The IP address is the number associated with your computer and it allows other computers connected to the Internet to identify the source of data, in addition to collecting information about the user’s browser and search engine but without identifying the user.

Using the IP address helps us solve any problems arising on our Servers, including statistics about the use of the Portal (such as number of users, the language of the computer used, etc). We never permit any party, other than the technical team of the Portal, to know your IP address.

2. Secure Information Transmission:

We assure users that this Portal relies on the highest security standards to protect their information. We work diligently on encrypting information regarded as sensitive, in addition to any data that should be kept secret, pursuant to legal requirements.

3. Cookie Files:

We may save (cookie) files on your computer when you first visit our Portal. Cookie files are a kind of data that help specify you as a user. They can be used to increase your utilization of the Portal and also to better understand needs of the majority of users.

Most browsers accept cookies as a default. Should you desire, you can re-configure the settings of your browser to refuse all cookies or to alert you when they are sent to your computer. Be aware that some services on the The Energy Loop Portal may not work properly if you refuse cookies. We may or may not link information saved within the cookies with any identifying information entered through our portal.

About cookies

A cookie is a file containing an identifier (a string of letters and numbers) that is sent by a web server to a web browser and is stored by the browser. The identifier is then sent back to the server each time the browser requests a page from the server.

Cookies may be either "persistent" cookies or "session" cookies: a persistent cookie will be stored by a web browser and will remain valid until its set expiry date, unless deleted by the user before the expiry date; a session cookie, on the other hand, will expire at the end of the user session, when the web browser is closed.

Cookies do not typically contain any information that personally identifies a user, but personal information that we store about you may be linked to the information stored in and obtained from cookies.

Cookies can be used by web servers to identify and track users as they navigate different pages on a website and identify users returning to a website.

3.1 Our cookies

We use both session and persistent cookies on our website.

3.2 Analytics cookies

We use Google Analytics to analyse the use of our website.

Our analytics service provider generates statistical and other information about website use and by means of cookies.

Our analytics service provider's privacy policy is available at: http://www.google.com/policies/privacy/.

3.3 Blocking cookies

Most browsers allow you to refuse to accept cookies; for example:

a. in Internet Explorer (version 11) you can block cookies using the cookie handling override settings available by clicking "Tools", "Internet Options", "Privacy" and then "Advanced";

b. in Firefox (version 47) you can block all cookies by clicking "Tools", "Options", "Privacy", selecting "Use custom settings for history" from the drop-down menu, and unticking "Accept cookies from sites"; and

c. in Chrome (version 51), you can block all cookies by accessing the "Customise and control" menu, and clicking "Settings", "Show advanced settings" and "Content settings", and then selecting "Block sites from setting any data" under the "Cookies" heading.

Blocking all cookies will have a negative impact upon the usability of many websites.

If you block cookies, you will not be able to use all the features on our website.

3.4 Deleting cookies

You can delete cookies already stored on your computer; for example:

a. in Internet Explorer (version 11), you must manually delete cookie files (you can find instructions for doing so at http://windows.microsoft.com/en-gb/internet-explorer/delete-manage-cookies#ie=ie-11);

b. in Firefox (version 47), you can delete cookies by clicking "Tools", "Options" and "Privacy", then selecting "Use custom settings for history" from the drop-down menu, clicking "Show Cookies", and then clicking "Remove All Cookies"; and

c. in Chrome (version 51), you can delete all cookies by accessing the "Customise and control" menu, and clicking "Settings", "Show advanced settings" and "Clear browsing data", and then selecting "Cookies and other site and plug-in data" before clicking "Clear browsing data".

Deleting cookies will have a negative impact on the usability of many websites.

4. Protecting Personal Information:

Your personal information will never be made available to the public without your prior consent. This information will not be circulated, exchanged or sold to any party without your prior consent. Our experts are only permitted to handle this information in order to provide such services of the Portal as are consistent with your needs. Your information may however, be made available to government officials, in the exceptional circumstances that this need should arise.

5. The Right to Know, Modify or Correct Personal Data:

Any user, who has previously provided us with information, has the full right to know, modify or correct their personal information. Changing personal information can be done through the The Energy Loop Portal in the Personal Account section.

6. Other Websites:

Our approach to privacy applies solely on the The Energy Loop Portal. When connecting to any other website through the portal, you should carefully read their privacy policy to know how information security and privacy procedures are followed there.