How we collect
information about you
When you visit the researchbib.com website, we collect your IP address and standard web log
information, such as your browser type and the pages you accessed on our
Before permitting you to use our Service, we may require you to provide
additional information we can use to verify your identity or address or manage
risk, such as your date of birth, social security number or other information.
We may also obtain information about you from third parties such as credit
bureaus and identity verification services.
Finally, we may collect additional information from or about you in other ways
not specifically described here. For example, we may collect information related
to your contact with our customer support team or store results when you respond
to a survey.
When you access our website, we, or companies we hire to track how our website
is used, may place small data files called "cookies" on your computer.
We send a "session cookie" to your computer when you log in to your account.
This type of cookie helps us to recognize you if you visit multiple pages on our
site during the same session, so that we don't need to ask you for your password
on each page. Once you log out or close your browser, this cookie expires and no
longer has any effect.
We also use longer-lasting cookies for other purposes such as to display your
preferred pages for you, so that you don't need to retype or change each time.
We encode our cookies so that only we can interpret the information stored in
them. You are free to decline our cookies if your browser permits, but doing so
may interfere with your use of our website.
How we protect and store personal
Throughout this policy, we use the term "personal information" to describe
information that can be associated with a specific person and can be used to
identify that person. We do not consider personal information to include
information that has been anonymized so that it does not identify a specific
We store and process your personal information on our computers in the Japan,
and we protect it by maintaining physical, electronic and procedural safeguards
in compliance with applicable Japanese regulations. We use computer
safeguards such as firewalls and data encryption, we enforce physical access
controls to our buildings and files, and we authorize access to personal
information only for those employees who require it to fulfill their job