Copyright:

Twilight Creations, the Twilight Creations logo, Zombies!!!, the Zombies!!! logo, "Where Fun Comes To Life", When Darkness Comes..., and Variable Tile System are trademarks or registered trademarks of Twilight Creations, Inc. All rights reserved.

Responsible for Content

Kerry Breiteinstein

Web: www.twilightcreationsinc.com
eMail: kerry[at]twilightcreationsinc.com

Design, Tech, Programming

Alexander Meid
Keplerstraße 25
D 45147 Essen

eMail: info[at]quellcodeschmie.de

 

Melanie Blaschek

eMail: info[at]quellcodeschmie.de

Links to Other Sites:

This site has links to other web sites as a convenience to our customers. These include links to web sites operated by nonprofit organizations and private businesses. When you use one of these links, you are no longer on this site. When you link to another web site, you are subject to the privacy policy of that new site.

When you follow a link to one of these sites Twilight Creations Inc does not warrant the accuracy, reliability or timeliness of any information published by these external sites, nor endorses any content, viewpoints, products, or services linked from these systems, and can not be held liable for any losses caused by reliance on the accuracy, reliability or timeliness of their information. Portions of such information may be incorrect or not current. Any person or entity that relies on any information obtained from these systems does so at his or her own risk.

Information Collected When You Browse State Web Pages

If you browse or download information during your visit to this web site, we collect and store only the standard data collected by all web server software. That information is:

  1. The Internet Protocol (IP) address used for your connection (but not your e-mail address). The IP address is a numerical identifier assigned either to your Internet service provider or directly to your computer. We use the Internet IP to respond to your browser request.  Example: 122.125.36.42;
  2. The domain name assigned to your IP Address (if there is one).  Example:   somename.com;
  3. The type of browser and operating system you used.  Example:  Mozilla/4.0 (compatible; MSIE 4.01; Windows NT; IE4WDUS-1998101501);
  4. The date and time you visited this site;
  5. The web pages or services you accessed at this site; and
  6. The web site you visited prior to coming to this web site. (Note: this is included so that summary analysis can be done on how visitors get to our site, i.e., from a search engine, from a link on another site, etc.

We do not track individual user navigation choices. We do, however, summarize the information listed above to determine:

  • what organizations are our most frequent users (item 2 above) to better target our content for the audience.
  • what browsers are being used on our site to determine what techniques we should use to develop pages that will work with different browsers (item 3 above).
  • how often our pages are being visited (item 5 above).
  • the traffic from organization names such as search engines that direct people to the site (item 6 above)

For site security purposes and to ensure that this service remains available to all users, this site may monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. If security monitoring reveals evidence of possible abuse or criminal activity, system personnel may provide the results of such monitoring to appropriate officials. Except for authorized law enforcement investigations, no attempts are made to identify individual users or their usage habits. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the state law and federal statutes including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996.