top of page

Privacy Policy

Please be assured that the privacy of our visitors is of utmost importance to us. We collect no personally identifiable information about you when you visit our site unless you choose to provide that information to us.

The specific practices outlined in this privacy statement apply to Web sites maintained by or on behalf of Full Potential Solutions, LLC and its affiliates. Other organizations within Full Potential Solutions may have slightly different practices, though the overarching commitment to your privacy will always be the same. You are encouraged to review the privacy policies of other organizations when visiting their Web sites. Some of our Web pages contain links to Web sites outside Full Potential Solutions. Please be aware that when you follow a link to another site, you are then subject to the privacy policies of the new site.

Automatic Collections: For each HTTP (which is what your Web browser generates when you request a page or part of a page from a Web site) request received,

we collect and store only the following information:

  • the date and time

  • the originating IP address

  • the type of browser and operating system used (if provided by the browser)

  • the URL of the referring page (if provided by the browser)

  • the object requested completion status of the request pages visited


How the Information is Used:

We use the information that we collect to measure the number of visitors to the different areas of our sites, and to help us make our sites more useful to visitors. This includes analyzing these logs periodically to determine the traffic through our servers, the number of pages served, and the level of demand for pages and topics of interest.

How Long is the Information Retained:


The logs may be preserved indefinitely and used at any time and in any way necessary to prevent security breaches and to ensure the integrity of the data on our servers.

Interaction with Children: Full Potential Solutions’ sites do not provide content to children and do not collect personally identifiable information from these visitors. Therefore, the requirements of the Children's Online Privacy Protection Act (COPPA) is not incorporated in this privacy policy.


Full Potential Solutions does not use "persistent cookies" or any other persistent tracking methods to collect personally identifiable information about visitors to its Web sites. Cookies are small files that Web servers place on a user's hard drive.


They can serve several functions:

  • they allow the Web site to identify you as a previous visitor each time you access a site

  • they track what information you view at a site (important to commercial sites trying to determine your buying preferences)

  • in the more advanced cases they track your movements through many Web sites but not the whole Web

  • businesses use them for customer convenience to allow them to produce a list of items to buy and pay for them all at one time and to garner information about what individuals are buying at their sites

  • advertisers use them to determine the effectiveness of their marketing and offer insights into consumer preferences and tastes by collecting data from many Web sites

  • and they can be used to help a Web site tailor screens for each customer's preference.


To protect your privacy, be sure to close your browser completely after you have finished conducting business with a Web site that does use cookies. If you are concerned about the potential use of the information gathered from your computer by cookies, you can set your browser to prompt you before it accepts a cookie. Most Internet browsers have settings that let you identify and/or reject cookies.

Personal Information via Forms:


Some of our sites provide forms allowing visitors to submit search engine queries, questionnaires, feedback, or other information. Some of these forms may request personally identifiable information (e.g., name, address, e-mail address) for specific purposes, such as when the submitter is requesting a personal response, registering for a conference, or subscribing to a mailing list. All information submitted by visitors is voluntary.

We may store non-personally identifiable information we collect (such as search engine queries and anonymous survey responses) indefinitely to help us better understand and meet the needs of our visitors. We may share non-personally identifiable information with others, including the public, in aggregated form (for instance, in a list of our most popular search engine queries), in partial or edited form (such as in a report summarizing responses to a questionnaire), or verbatim (for example, in a complete listing of survey responses).


Before collecting personally identifiable information, we will prominently disclose:

  • why we are requesting the information

  • how it will be used

  • how long it may be retained; and

  • under what conditions, and with whom, it may be shared.

Consent to Information Collection /Sharing:


Generally, we will not share any personally identifiable information you give us with any government agency, private organization, or the public, except with your consent or as required by law. By pressing the "submit" button, each visitor constitutes consent to use the information for purposes stated in this policy.


How e-mail is Handled:

By sending us an electronic mail message (for example, an e-mail message containing information request), you may be sending us personally-identifying information. In these cases, we may retain the information as long as necessary to respond to your request or otherwise resolve the subject matter of your e-mail. Please be aware that email is not necessarily secure from interception or misdirection. For your own protection you may wish to communicate sensitive information using a method other than email.

Information Protection:


We want to be very clear: regardless of the information being transmitted to any Full Potential Solutions site, we will protect all such information consistent with applicable.

For site security purposes and to ensure that this service remains available to all users, this computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage to the information on our Web sites. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986.

Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction.

Full Potential Solutions may share information received from its Web sites with other Full Potential Solutions affiliates. For example, if a breach of our IT security protections were to occur, the information collected by our servers and staff could be shared with appropriate law enforcement and Security officials.

Dispute Resolution:

If for some reason you believe this site has not adhered to these principles, please notify the Director of Security and Compliance by e-mail at If our web pages are not fully in compliance with our stated policies, they will be corrected.

bottom of page