Security Policy


Please read this security policy carefully as it will help you understand how this site is works.

Security Policy @ Packing a Life [Pal]


Security Policy for the Use of Packingalife.Com

Some of our web sites send general information about your visit to Google Analytics. We do not send personal information to Google Analytics. We do collect and store technical information about your visit in server logs. This information can help us analyze use of our website(s), diagnose server problems, and administer the website. This information may include the following:

  • User/Client hostname or IP address.
  • HTTP header, “user agent” information (browser, its version, and operating system).
  • HTTP header, “referrer” information (the page that directed the client to the current page).
  • System date (date and time of request).
  • Full request (exact request made).
  • Status (status code returned in response to the request).
  • Content length (in bytes, of the file sent in response to the request).
  • Method (request method used).
  • Universal Resource Identifier (URI; location of a resource on the server).
  • Query string of the URI (anything after the question mark in a URI).
  • Protocol (transport protocol and version used).

We will only release information when legally required to help law enforcement investigations, legal proceedings, or internal investigations of PACKING A LIFE (PAL) rule and regulation violations. These groups would use the information to track the electronic interactions back to the source. The Company does not sell any personal information to third parties.

All information collected from our web sites, including server logs, and information collected from web forms, or email you send to us, may be subject to the Florida Open Records/Open Meetings Act. This means that while we do not actively share information, in some cases we may be compelled by law to release this information.

1. Cookies

A cookie file contains unique information that a web site can use to store such things as passwords, or pages you have visited, or the date you last looked at a specific page. Cookies can also identify your server session at a particular web site. We do not use cookies to collect or store personal information.

2. Sessions

A server session is like a cookie that is stored on a web server. It can store information such as what web pages you visited, when you visited a web page, or personal information that you supply or information the web page retrieves for you. Occasionally, we use server sessions to store information about your session. For example, we may require you to login to a web site and store your username; distinguishing you from other people using the site.

3. Google Analytics / Analytics Software
  • User/client hostname: The host–name or IP address of the user/client requesting access.
  • HTTP header, “user agent”: The user–agent information includes the type of browser, its version, and the operating system on which it is running.
  • HTTP header, “referrer” information (the page that directed the client to the current page).
  • System date (date and time of request).
  • Universal Resource Identifier (URI): The location of a resource on the server including web pages, images, and other files.
  • HTTP header, “referrer”: The referrer specifies the page from which the user/client accessed the current page.
  • Screen colors: Color processing ability of the user/client screen.
  • Screen resolution: The resolution or dimensions of the user/client screen.
  • Service Provider: The Internet service provider of the user/client.
  • Mobile device: If user/client is a mobile device, the manufacturer of the mobile device.
  • Mobile carrier: If user/client is a mobile device, its Internet service provider.
  • Bandwidth (Internet connection speed): The speed of the user/client connection from their Internet service provider.
  • Java support: If Java is enabled.
  • Flash version: Which version of Adobe Flash is installed.
  • Geographic data: Country, State, City, language preference of the user/client.
  • Time on page: The time spent on a web page.
4. Information Security

We employ extensive security measures consistent with the Open Web Application Security Project (OWASP) to protect against unauthorized access, disclosure, modification, or destruction of information under our control, as well as the loss, misuse, or alteration of our web sites and/or associated electronic information resources. The information resources that support our web sites undergo an annual information security risk assessment.