Copyright and Policy
Material on this web site is copyrighted by Children’s Institute. Written permission must be obtained from Children’s Institute for use of materials.
Unless otherwise specified, all pages and information are copyrighted by Children’s Institute. All graphics are the property of Children’s Institute and may not be duplicated without prior written permission.
If you see something in a Children’s Institute document that should be corrected, please contact mmaiolo [at] childrensinstitute [dot] net (Mary Maiolo). Be sure to give the full URL (web address) of the document in your e-mail.
Links to Third Party Sites
Many links on this web site will let you leave the Children’s Institute site. These linked sites are not controlled nor endorsed by Children’s Institute, nor is Children’s Institute responsible for the contents. We provide these links to you only as a potential resource which requires your evaluation. Should you discover inappropriate links on the Children’s Institute site, please sent the URL (web address) to mmaiolo [at] childrensinstitute [dot] net (Mary Maiolo).
Any information, including names, mailing/email addresses and phone numbers acquired through the "Contact Us" form on the Children’s Institute site will be used solely for the purpose of sending agency or program information specifically requested by the individual contacting our organization. All collected information is considered highly confidential. This information will never be sold, traded, or otherwise used except as stated on the form. Should you wish to review personal information or request corrections to that information, please contact cwalker [at] childrensinstitute [dot] net (Cyndie Walker).
Children’s Institute computer infrastructure is secured via managed security services over a multi-tiered protection schema. All data is encapsulated using secure authenticated access methods, strong encryption protocols, multiple network architecture encapsulation rings, secure independent hardware-based firewall architectures, and real-time monitoring and response of both public and private network connections.