A cookie is information a website places on your computer’s hard drive so that the website is able to remember your preferences and/or which pages you visited on the website and make your visit more efficient and enjoyable.
Cookies & Logs
Avalanche may use cookies to determine the number of unique visitors to the Website over a given period, or to remember user account details, etc. so that the need for multiple log-ins is eliminated. It may combine information collected through cookies to any personal information submitted online when using the Website to help personalize a user’s access to and use of the Website. Cookies may be disabled on your computer by indicating this in the preferences or options menus in your browser.
Log files are files that log actions that have occurred on a website. Avalanche may collect data in the form of log files and may use such log files to gather statistics about Visitors browsing habits and to assess overall website activity, including how many "hits" a particular web page is getting and other navigational data. These entries are generated anonymously, and enable us to track interest in specific promotions, troubleshoot technical concerns, and provide Visitors with content that may be of interest to them. Log files are used internally only, and are not associated with any particular user, computer, or browser.
The Avalanche website may use a variety of technical methods for tracking purposes, including “Web beacons” etc. Web beacons are small pieces of data that are embedded in images on the pages of websites. We may also use these technical methods to analyze the traffic patterns on our websites, such as the frequency with which consumers visit various parts of our websites. These technical methods may involve the transmission of information either directly to us or to another party authorized by us to collect information on our behalf. We also use these technical methods in HTML emails that we send our guests to determine whether our consumers have opened those emails or clicked on links in those emails. The information from use of these technical methods may be collected in a form that is personally identifiable.