Copyright © 2012, Armenian General Benevolent Union. All rights reserved. Unless otherwise indicated, all information contained on this Web site, such as text, graphics, logos, button icons, images, audio and video clips, is copyrighted by and proprietary to the Armenian General Benevolent Union (AGBU) and as such may not be copied, reproduced, modified, published, uploaded, transmitted or distributed in any form or by any means other than as described by AGBU or with AGBU’s prior written permission. The content displayed on any page of this Web site may be used for personal and noncommercial uses which do not harm the reputation of the Armenian General Benevolent Union, provided that the user does not remove any trademarks, copyright and any other notice contained in such content.
Any user who duplicates electronically or in printed form, retransmits, redistributes or otherwise uses material on this web site shall be solely responsible for any violations of copyright proprietary or other personal right, including libel or slander, or any other personal injury, and hereby agrees to indemnify and hold the Armenian General Benevolent Union harmless from any loss or damage, including attorneys’ fees, arising out of any claim or proceeding instituted on the grounds that any of the foregoing rights have been violated.
The Armenian General Benevolent Union collects the following information through our secure online financial-transaction pages: name, address, e-mail address, phone number, and credit card information. This personally identifiable information is used to acknowledge receipt of your donation for tax purposes and to include you on the AGBU mailing list if you choose to join it.
The Armenian General Benevolent Union applies industry-standard practices and technologies to safeguard your credit card information. We use high-grade encryption and the secure https protocol to communicate with your browser software, which guards against interception of the credit card information you give us. We also employ several different security techniques to protect your personally identifiable information from unauthorized access by users inside and outside the organization. The Web servers for the organization are located in a locked, secure environment, and computer systems are maintained in accordance with industry standards to secure information. You should be aware, however, that “perfect security” does not exist on the Internet, and third parties may unlawfully intercept or access transmissions or private communications.
For questions relating to this web site or for further information email email@example.com.