Privacy & Security
Privacy & Security Statement
When you visit and browse the Site, we may collect two different types of information about you: information you provide to us, and information we collect through technology. Grand Basin does not share any information provided directly to the company to any third-parties.
- Information You Provide to Us
In order to obtain access to certain services provided via the Site and request certain information regarding Grand Basin directly from the company via the Site, you may be required to provide personally identifiable information such as your name, postal address, e-mail address, telephone number, facsimile number and investor status. You can choose not to provide this information, but then you might not be able to gain access to such information and services.
- Information We Collect Through Technology
We may collect certain aggregate and non-personal information when you visit the Site. We may collect this information through "cookie" technology. Cookies are bits of text that can be placed on your computer's hard drive when you visit certain websites. Cookies may enhance your online experience by saving your preferences while you are visiting a particular site. The "help" portion of the toolbar on most browsers will tell you how to stop accepting new cookies, how to be notified when you receive a new cookie, and how to disable existing cookies. Remember, though, without cookies, you may not be able to take full advantage of all of the Site features.
You may not violate or attempt to violate the security of the Site. Tampering with any portion of the Site, providing untruthful or inaccurate information, misrepresenting your identity, or conducting fraudulent activities on the Site, whether or not through the use of agents, are prohibited and constitute a breach of these Terms and Conditions of Use.
You are prohibited from violating or attempting to violate the security of the Site, including, without limitation:
(a) accessing data not intended for you or logging onto a server or an account which you are not authorized to access;
(b) disabling, removing, defeating, or avoiding any security device or system, including, without limitation, any password and login functionality used to authenticate users;
(c) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization;
(d) attempting to interfere with service to any user, host or network, including, without limitation, via means of submitting a virus to the Site, overloading, "flooding," "spamming," "mailbombing" or "crashing;"
(e) sending unsolicited email, including promotions and/or advertising of products or services;
(f) forging any TCP/IP packet header or any part of the header information in any email or posting;
(g) using or attempting to use any engine, software, tool, agent or other device or mechanism (including, without limitation, browsers, spiders, robots, avatars or intelligent agents) to navigate or search the Site other than the search engine and search agents available on the Site and other than generally available third party web browsers;
(h) reverse engineering, decompiling or disassembling the underlying software;
(i) removing any notices, warnings, labels, annotations or instructions from any portion of the Site or any related material, including, without limitation, any patent, trademark, copyright, or other proprietary notices or license provisions; or
(j) otherwise invading the privacy of, obtaining the identity of, or obtaining any personal information about any user of the Site.
Any violations of system or network security, including attempts to intentionally access a computer without authorization or exceed your authorized access level, may result in civil and criminal charges, including but not limited to charges under the Computer Fraud and Abuse Act (18 U.S.C. §1030). Grand Basin may investigate occurrences that might involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations. We may, without prior notice or warning of any kind, restrict or terminate the access of any and all users to the Site if we reasonably conclude that such restriction or termination is necessary to prevent, or prevent the further spread, of a virus, security breach or system malfunction.