Skip to main content

PRIVACY POLICY

OUR COMMITMENT TO PRIVACY & SECURITY

The British American University (BAU) is strongly committed to maintaining the privacy and security of confidential personal information and other highly sensitive data that it collects. Our privacy and public records obligations are governed by applicable Florida Statutes, including, but not limited to, the Privacy Protection Act, Freedom of Information Act and by any applicable United States federal Laws.

Notice about the Information We Collect

This notice applies to all information collected by or submitted to official BAU websites. The following information explains the Internet privacy policy and practices that the University has adopted for its official websites. This notice should not be construed as a contractual promise, and the University reserves the right to amend it at any time without notice. When you access our Web pages, the client information and the essential and nonessential technical information listed below is automatically collected—we refer to those categories collectively as “access information.”  No other information is collected through our official website except “optional information” sent to us by email or online forms.

Automatically Collected Access Information

  • Client information: the Internet domain and Internet address of the computer you are using.
  • Essential technical information: identification of the page or service you are requesting, type of browser and operating system you are using and the date and time of access.
  • Nonessential technical information: the Internet address of the website from which you linked directly to our website and the “cookie information” described below.

Optional Information

  • Personal Data: when you send us an email we may collect your email address, your name and the content of your email.
  • Form Data: when you complete online forms, all the data you choose to fill in or confirm, including credit or debit card information if you are ordering a product or making a payment, as well as information about other people if you are ordering a gift and want it sent directly to the recipient’s address.

The Way We Use Information

Client information is used to route the requested Web page to your computer for viewing. In theory, the requested Web page and the routing information could be discerned by other entities involved in transmitting the requested page to you. We do not control the privacy practices of those entities. Essential and nonessential technical information helps us respond to your request in an appropriate format (or in a personalized manner) and helps us plan website improvements. Optional information enables us to provide services or information tailored more specifically to your needs or to forward your message or inquiry to another entity that is better able to do so and also allow us to plan website improvements.

We may use non-identifying and aggregate information to better design our website. For example, we may report that X number of individuals visited a certain area on our website or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals. We may keep client information from our systems indefinitely after the Web page is transmitted, but we do not try to obtain any information to link it to the individuals who browse our website. However, on rare occasions when a “hacker” attempts to breach computer security, logs of access information are retained to permit a security investigation and in such cases may be forwarded together with any other relevant information in our possession to law enforcement agencies.

Under the Freedom of Information Act, any records in our possession at the time of a Freedom of Information Request might be subject to being inspected by or disclosed to members of the public for any purpose they may desire. As indicated above, client information may be retained after transmission of the requested Web page and might be available for inspection. We use the information you provide about yourself when placing an order or request only to complete that order or request. We do not share this information with outside parties except to the extent necessary to complete that order or request. Similarly, we use the information you provide about someone else when placing an order or request only to complete that order or request. Again, we do not share this information with outside parties except to the extent necessary to complete that order or request. We generally use return email addresses only to answer the email we receive. Such addresses are generally not used for any other purpose and by University and state policy are not shared with outside parties. Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above without clear notice and the opportunity to opt-out or otherwise prohibit such uses.

Promoted Posts and Advancement Usage

The University may provide email addresses and/or phone numbers collected by the University to digital services, including social media platforms and search engines, for the purpose of reaching audiences via those services to promote the University and its services. In addition, third parties may use cookies, web beacons, and similar technologies to collect or receive information from your website and elsewhere on the internet and use that information to provide measurement services and target ads. Finally, we may receive and store information about you from other sources and add it to our institutional advancement database.

Providing Information Is Your Choice

There is no legal requirement for you to provide any information at our website. However, our website will not work without routing information and the essential technical information. Failure of your browser to provide nonessential technical information will not prevent your use of our website but may prevent certain features from working. For any optional information that is requested at the website, failure to provide the requested information will mean that the particular feature or service associated with that part of the Web page may not be available to you.

Our Commitment to Data Security

To prevent unauthorized access, maintain data accuracy and ensure the correct use of information, we have put in place appropriate physical, electronic and managerial procedures to safeguard and secure the information we collect online, consistent with the policies of the University and with the US laws and regulations of the Florida Department of Education.

Acceptable Use

All users of University information technology (IT) resources are required to use them in an ethical, professional, and legal manner.

Data Protection

Users must comply with all University policies and standards for the data to which they have been granted the ability to view, copy, generate, transmit, store, download, or otherwise acquire, access, remove, or destroy. Users must also meet any additional compliance requirements for data protection stipulated by various governmental, legal, or contractual entities.

Information Security

Owners and overseers of the University’s information technology (IT) resources must take reasonable care to eliminate security vulnerabilities from those resources.

Privacy & Confidentiality

The University is committed to the privacy of individuals and to safeguarding information about individuals subject to limitations imposed by local, state, and federal law and other provisions described in the policies, standards, and procedures.  The University, as steward of public resources and electronic information, shall respond to requests for electronic information in an orderly manner consistent with state and federal law and the policies, standards, and procedures listed below.

Exceptions

We understand the need for flexibility in becoming compliant with the updated policies, so a new process has been developed to request exceptions to a policy, standard, or procedure. There must be a legitimate business reason and proof that any potential risks will be mitigated before placing an exception request.

Report an Information Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

COMPLETE REPORT FORM

Please complete the form below to report any level of incident, no matter how small the Information. Security office will evaluate the report and provide a full investigation where necessary.