We do not automatically gather any personal information from you, such as your name, phone number, or e-mail address. This information is obtained only if you supply it voluntarily, usually through contacting us via e-mail or by providing it on an online form. Dolphin Hotel does not sell or otherwise distribute any information collected to third parties.
When you submit a question or comment, you may be asked for your name, e-mail address, or other information. This personal information is used to process and respond to your question or comment and is only disclosed to those who need it to answer your question, to the person that your inquiry relates to or to parties legislatively authorized to receive the information. If you complete an online form and submit it to us through our web site, we use that information for the purposes described on the form. Personal information collected from an online form will be treated in accordance with the privacy protection provisions.
When you visit Dolphin Hotel’s web site, our web server automatically collects a limited amount of standard information essential to the operation, security and evaluation of the web site. This information includes:
IP address from which you access the web site
Type and version of browser used to access our site
Date and Time you access our site
Pages you visit, and
The information is primarily used to help us to assess our services in order to efficiently provide you with the information you require.
A cookie is a small piece of text information that is sent to your browser when you access a web site. Your browser will return this cookie information to the domain where the cookie originated. Cookies may be created when you visit our site. The session cookie we incorporate allows us to determine common paths used by our viewers. This information allows us to streamline navigation to the most requested pages during future upgrades.
For site security purposes and to ensure that web services remain available to all users, the district's computer system uses software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage to the service we provide. No attempt is made to identify an individual user or their usage patterns except for law enforcement investigations.