• banner

    banner

  • banner_f8

    banner_f8

  • banner_f7

    banner_f7

  • banner_f2

    banner_f2

  • banner_f4

    banner_f4

  • banner_f5

    banner_f5

  • banner_f3

    banner_f3

Privacy Policy

Privacy Policy

We collect no information about you, other than information automatically collected and stored (see below), when you visit our website unless you choose to provide that information to us.

Information Automatically Collected and Stored:

When you browse through any website, certain personal information about you can be collected. We automatically collect and temporarily store the following information about your visit:

  • the name of the domain you use to access the Internet (for example, cs.com, if you are using a CompuServe account, or name-of-business.com, if you are connecting from a commercial business domain);
  • the date and time of your visit;
  • the pages you visited; and
  • The address of the website you came from when you came to visit.


We use this information for statistical purposes and to help us make our website more useful to visitors. Unless it is specifically stated otherwise, no additional information will be collected about you.

Personally Provided Information:
You do not have to give us personal information to visit our website.
If during your visit to our website you provide Avionic Instruments, LLC with personal information, such as your name, title, organization, address, fax number, e-mail address or telephone number, we may collect and use that personal information to provide you with services or information that you request, or to communicate with you for other purposes.

Disclosure:
In no event do we sell any of the information collected or stored about you.
Our websites may contain links to websites not affiliated with Avionic Instruments, LLC. Avionic Instruments, LLC is not responsible for the privacy practices of such websites.

Intrusion Detection:
For website security purposes and to ensure that this service remains available to all users, we may employ software programs to monitor traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from these sources may be used to help identify an individual.

Print Email