Home Site Map Privacy Policy

We will not obtain personally identifying information about you when you visit our site.

TEMS Course Info
RTI Alumni
Challenge Coin
RTI Class Pictures
Surgeon General
Contact Us
EMTT Links





Privacy Policy
Thank you for visiting the EMT-Tactical website and reviewing our privacy and security policy. Our privacy policy is clear - we do not collect any personal information about you without your knowledge.

This website is provided as a public service by Rescue Training Inc. Information presented on this site is considered public information, but certain materials used on this website are the property of different organizations.  Accessing these organizations and other sites through hyperlinks from this website still require legal adherence with their respective copyright protection and other provisions inherent within their site and/or documents. However, the content and design of the web pages (other than the hyper-linked material) are copyright of Rescue Training Inc. This means that downloading, copying and printing materials from these web pages is allowed only for use by public safety personnel, and private home use. However, it is strictly forbidden to download, copy or print materials from this site for purposes of publication (commercial or otherwise) elsewhere on the Internet (including, but not limited to, the World Wide Web) or in print without prior approval of Rescue Training Inc.

Information Collected on All Website Visits

If you do nothing during your visit but browse through the website, read pages, or download information, we will gather and store certain information about your visit automatically - but none of this information will identify you personally. We automatically collect and store only the following information about your visit:

bulletThe Internet domain (for example, "xcompany.com" if you use a private Internet access account, or "yourschool.edu" if you connect from a university's domain) and IP address (an IP address is a number that is automatically assigned to your computer whenever you are surfing the Web) from which you access our website;
 
bulletThe type of browser and operating system used to access our site;
 
bulletThe date and time you access our site;
 
bulletThe pages you visit; and
 
bulletIf you linked to the EMT-T website from another website, the address of that website.

We use this information to help us make our site more useful to visitors -- to learn about the number of visitors to our site, to determine what information is of most and least interest, to identify system performance or problem areas, and to help us in determining technical design specifications. Again, we do not track or record personal information about individuals and their visits without your knowledge.

Information Collected from E-mails and Web Forms

If you choose to provide us with personal information by sending an e-mail or by filling out a form with your personal information and submitting it through our website, we will use this information to respond to your message and to help us provide you information that you request. We do not collect personal information for any other purpose.

The information you provide is strictly not given to any private company or organization or to any private persons. This site also does not collect or use personal information for commercial marketing.

And once again, we will not obtain personally identifying information about you when you visit our site, unless you choose to provide such information to us.

Links to Other Sites

The EMT-T website has links to the websites of many other agencies and organizations that support the tactical medic mission. In a few cases, we may also link to private organizations, with their permission. In all cases, you will be given clear indication that you are leaving the EMT-T website. Once you have linked to another site, you are then subject to the privacy policy of that site.

Security and Intrusion Detection

For site security purposes and to ensure that this service remains available to all users, this computer system employs software programs to monitor host and network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act."