{"id":45,"date":"2022-09-29T05:43:19","date_gmt":"2022-09-29T05:43:19","guid":{"rendered":"http:\/\/lasercatmiami.com\/?page_id=45"},"modified":"2023-04-14T06:28:30","modified_gmt":"2023-04-14T06:28:30","slug":"legal","status":"publish","type":"page","link":"http:\/\/lasercatmiami.com\/legal\/","title":{"rendered":"Legal"},"content":{"rendered":"

General Disclaimer<\/h2>\n

Materials displayed on our websites are intended for reference use only. Our websites link to other federal agencies\u2019 and other organizations\u2019 websites when there is a business reason to do so. The links are not endorsements of the content of the websites, or of their policies or products.<\/p>\n

Security<\/h2>\n

To maintain the security of our websites, and to ensure that they remain available to you, we use software programs to monitor network traffic. The programs identify unauthorized attempts to upload or change information, deny service, or otherwise cause damage or access non-public information. Unauthorized attempts to upload or change information are strictly prohibited and may be punishable under the United States criminal code (18 U.S.C. 1030). We may provide information about possible violations of the law to law enforcement officials.<\/p>\n

We reserve the right to block IP addresses that fail to honor our websites\u2019 robot.txt files, or submit requests at a rate that negatively impacts service delivery to patrons. Current guidelines recommend that software programs submit a total of no more than 10 requests per minute to our applications, regardless of the number of machines used to submit requests. We also reserve the right to terminate programs that require more than 24 hours to complete.<\/p>\n

The community of security researchers plays an important and vital role in information technology (IT) security. Laser Cat Miami welcomes reports from security researchers, and encourages researchers to report any vulnerabilities they discover in Laser Cat Miami web applications as soon as possible. This page provides a set of public rules and guidelines for researchers to report potential vulnerabilities in the Laser Cat Miami\u2019s public-facing websites and how the Laser Cat Miami will work with a researcher after a vulnerability has been validated.<\/p>\n

About Copyright and the Collections<\/h2>\n

As a publicly supported institution, we generally do not own the rights to materials in our collections. You should determine for yourself whether or not an item is protected by copyright or in the public domain, and then satisfy any copyright or use restrictions when publishing or distributing materials from our collections. Transmission or reproduction of protected items beyond what is allowed by fair use or other exemptions requires written permission from the copyright holder.<\/p>\n

If you have more information about material on our websites or are able to provide specific, additional information about the copyright status of a particular item in our collection, please contact us at lasercatmiami.com or at the address listed in the \u201cAbout this Collection\u201d entry for the item. If you are the copyright holder and believe our websites have not properly attributed your work or have used it without permission, please contact office@lasercatmiami.com with your contact information and a link to the relevant content.<\/p>\n

Privacy Policy<\/h2>\n

Protecting our patrons\u2019 personal information is important. We collect, use, and share information obtained from online visitors only in the following ways:<\/p>\n