Ivey Custom Homes, Inc. collects certain information relative to users who visit the site. Our Web site categorizes this information into certain categories and the privacy level and what we do with the information that we collect on you depends upon the category in which you fall.
Ivey Custom Homes, Inc. does not make any attempt to obtain information that personally identifies our users who visit our web site. It is not our policy to sell or otherwise provide access to such information to unaffiliated third parties.
Category I – Information on users who visit www.iveycustomhomesinc.com and / or www.davidiveyhomes.com to read or download information on our pages. From these users, we collect and store only the following information:
The domain name through which you gained access to our Web site.
The precise time and date that you entered our web site.
The URL of the web page through which you linked to our web site.
Category II – Users who send us e-mail containing personal information or identifies you, sign our guest book, or request email publications. Any information that we collect in this way is used only for purposes of responding to you and addressing the issues that you may have raised.
Any information that we collect is collected as part of our business practices in order to identify demographic information relative to users who access our site, assessing the number and type of user accessing various sections of our site, helping us determine what content and business concepts are working for us and/or are of interest to our visitors, determining technical design features and specifications and helping us assess systems performance. We also use such information in statistical form to assist us in business and marketing strategies and programs. We utilize software programs to create summary statistics which we utilize for the above purposes.
As a security measure for ourselves and our users, we utilize certain software programs to monitor traffic to our site and within our network. This software also enables us to identify unauthorized upload attempts, access to our system, and other attempts to cause damage to our systems.