Campaigns

Petition: remove women of transsexual / intersex history from the GLAAD Media Reference Guide.
[ link ] Also read Andrea Rosenfield's call for reform here at TS-Si.[ link ]

TS-Si supports open and immediate access to publicly funded research.
xkcd
TS-Si Site News
Situs Interruptus. TS-Si has returned to operation and is fully functional.
TS-Si Security Statement |
![]() |
![]() |
TS-Si - Policies | |||
TS-Si | |||
Thursday, 30 March 2006 01:00 | |||
About our Web siteTS-Si, which includes TS-Si, Inc. TS-Si.org, and related websites, recognize the importance of online security.
This page has our organization's standard security statement. It also has some information about extra security efforts we have taken to protect the safety of on-line transactions.
Outbound LinksOur Website has many links to other sites. When you link to any of these sites, you are no longer on our site and are subject to the privacy policy of the new site.
Protection of InformationTS-Si has measures in place to protect information under our control from loss, misuse or alteration. Additionally, any part of our website that receives or presents sensitive or confidential information is protected through Secure Socket Layer (SSL) encryption and other measures. We do not store credit card numbers used in any online transaction through our website.
Security for your own ComputerProtect your own computer by doing these things:
WarningFor site security purposes and to ensure that this service remains available to all users, TS-Si webservers employ industry-standard methods to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Unauthorized attempts to upload information or change information on TS-Si servers are strictly prohibited and may be punishable by law, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act. In the specific context of this security monitoring, there is no expectation of privacy. However, only in the case of actual law enforcement investigations, will we attempt to identify individual users or their usage habits.
Bookmark
Email This
Trackback(0)
Comments (0)
Write comment
|
|||
Last Updated on Saturday, 20 December 2008 00:42 |