NAVIGATIE
• Freetime overzicht
• Zoeken
RUBRIEKEN
• FAQ / Help
• Wat mag niet?
• WZL Wedstrijden
• WZL Chat
• WZL Toolbar
• WZL Statistieken
• WZL leden
• WZL shop
• E-cards
RSS 
• Fun-feed
• Babe-feed
• Stud-feed
Een groot aantal pokerrooms geven
de mogelijkheid om poker te spelen op internet en geld te storten via het veilige iDeal betaalsysteem.
|
Origineel bericht
|
WishMaster
Sinds 26/2/2003
T: 99
R: 2018
|
19/7/2005 -
11:49u
|
Quote
|
URL
Data Collection Policy
Microsoft Error Reporting asks users to send error report data to Microsoft via the Internet. This Web page explains the nature of the data, why it is collected, and what is done with it.
Why error data is collected Error report data is used to find and fix problems in the software you use. It is not used for marketing purposes.
What data is collected To fix problems in the software you use, we need information about what the software was doing when it experienced the problem, and about your machine configuration. For a description of the categories of data we collect, see the section below called Types of Data.
When collecting information, it is possible for personal or confidential information to be present in the report. For instance, a snapshot of memory may include your name, part of a document you were working on, or data you recently submitted to a Web site. It is also possible for personal information to be included in a log file, a portion of the registry, or other product specific files needed to determine the cause of the problem. If you are concerned that the report may contain personal or confidential information, please do not send the report.
You may be asked to answer a survey after sending an error report. Responding to the survey is optional. If you send an error report without sending survey information, your error report remains anonymous. If you choose to provide a phone number or email address then we may contact you to ask for additional data that will help us solve a problem.
In some cases you may also be presented with an opportunity to track your error report. If you choose to track an error your report is no longer anonymous and will be associated with your email address.
How data is stored When you submit an error report, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol. When we receive an error report, we use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure. For example, we store the error reports you provide on computer servers with limited access.
Who has access to error report data Microsoft employees, contractors and vendors who have a business need to use the error report data are provided access. If the error report indicates that a third-party product is involved, Microsoft may send the data to the vendor of that product, who may in turn send the data to sub-vendors and partners.
Types of Data The Microsoft Error Reporting service is integrated into a large number of Microsoft products and is used to report a wide variety of errors. This section presents many of the potential pieces of data that may be collected as part of the error report, but is not an exhaustive list. The type of data and amount of data we request is dependent on the severity of the error and relevance of the data to troubleshooting the problem.
Recent Actions
Data about recent actions taken by you or the software application, such as:
* The task you were working on at the time * Menus or toolbars you clicked on * Dialogs that were displayed at the time of the error
Network
Data related to your network connections, such as:
* IP address (identifies your computer on the internet) * Names of Web sites you recently visited * Information you submitted to Web sites
Machine Configuration
Data about your physical machine, such as:
* Devices and components installed on your machine * Plug and Play ID (PnP ID) and description of devices * Machine name * System name, type, model and manufacturer * Amount of RAM, hard disk size, number of processors * BIOS version and data * Registry data
Files
Names, versions and copies of actual files, such as:
* Your documents * Application files * Configuration files * Setup logs * Networking report summary * Diagnostic logs
Memory
Data contained in specific segments of memory, such as:
* Application instructions being executed at the time of a crash * Data values stored temporarily by the application * Program files and drivers that have been loaded into memory * Full memory dump (dependent on type of error encountered)
Software Configuration
Data about the configuration and settings of software on your machine, such as:
* Digital Product ID (your software license) * Operating system name, version and language * Filenames and versions installed in the affected application's directory * Installed drivers, fonts, templates, add-ins, themes, ActiveX controls * Registry settings
Ik stuur het mijne nooit op zenne
|
|
|