NIEJI Website Privacy Policy

The National Indigenous Elder Justice Initiative (NIEJI) provides this website as a public service. NIEJI does not collect personal information about you when you visit this website, other than automatically collected information and any information you choose to provide.

Automatically Collected Information

The following information is automatically collected and stored about your visit to our website:

  • IP address from which you access the Internet
  • name of the domain you use to access the Internet
    (for example,, if you are using an American Online account)
  • URLs of web pages which referred (linked) you to our site
  • browser used to access our site
  • date and time of your visit
  • pages you visited
  • words you searched for on our site

This information is used for statistical purposes and to help make the NIEJI site more useful to visitors. Unless it is specifically stated otherwise, no additional information will be collected about you.

Personally Provided Information

You do not have to provide any personal information to visit the NIEJI website.

If you choose to provide NIEJI with personal information by sending an e-mail, or by filling out a form with your personal information and submitting it through this website, NIEJI staff will use that information to respond to your message and provide you with the information or material that you request.


NIEJI does not give, share, sell, or transfer any personal information to a third party unless required by law.

Links to Other Sites

The NIEJI site links to other Internet sites that provide information about rural health. Once you link to another site, you are subject to the privacy policy of the new site. The NIEJI site also provides e-mail addresses for certain contacts outside of the NIEJI office. Correspondence sent to e-mail addresses outside of is subject to the privacy policy of the contact's organization.


For site security purposes and to ensure that this service remains available to all users, NIEJI uses software programs to monitor traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from these sources may be used to help identify an individual.