Privacy Notice
This notice explains how Christian Warrior Training (CWT) handles information submitted through the Suspicious Activity Reporting site at alert.christianwarriortraining.com. It is written in plain language so you can make an informed decision about what to include in your report.
What we collect
When you submit a report, we receive the information you choose to enter in the form. This may include:
- Your name and email address; phone number only if you choose to provide it
- Your role and organizational affiliation
- Details about the suspicious activity you are reporting
- Files you upload (photos, screenshots, documents)
You decide what to include. The required fields are your name, email address, the date, type, and description of the incident, the source of information and your confidence level, the threat assessment questions, and the acknowledgement checkbox.
We recommend submitting only the information relevant to the incident. Beyond the required contact information and details needed to describe the incident, you do not need to include any additional personal details. Uploaded files are entirely optional.
What we collect automatically
When you submit a report, the following technical information is recorded automatically:
- Your IP address — included in the report email sent to CWT. This is a standard part of how web servers operate and is used only for abuse prevention.
- Server access logs — the web hosting provider (HostGator) records standard server logs, including IP addresses, timestamps, and pages visited. CWT does not control the hosting provider's log retention policies.
- Rate-limit records — a hash of your IP address is temporarily stored on the server to prevent abuse. These records are automatically pruned after one hour and contain no report content.
How we use your information
Submitted reports are delivered to authorized CWT personnel by email. CWT uses reports for:
- Reviewing and assessing reported activity
- Identifying patterns and trends across multiple reports
- Building situational awareness for the Christian Community
Your email address is required as part of your submission and will be used only to send you a confirmation copy of your report. Your email will not be added to any mailing list or used for marketing.
How we store and deliver your information
This site does not use a database. The form is served over HTTPS, so the data you type and the files you upload are encrypted while they travel from your browser to the web server. After that, reports are delivered to a CWT email inbox.
- Report text and form data — sent by email from the web server to the CWT email inbox and stored in that inbox. No copy of the report text is retained on the web server after the email is sent.
- Uploaded files — always saved on the web server in a directory that is not accessible from the web. Depending on the site's configuration, email limits, and the combined size of files already included with that submission, some uploaded files may also be attached to the report email for faster review, while others may remain server-only for manual retrieval by CWT. The report email labels each file as attached or server-only so it is clear where the file is.
- Rate-limit logs — temporary files containing hashed IP addresses and timestamps. Automatically pruned after one hour. No report content is stored in these files.
What this site does not do: it does not run automatic malware scanning on uploaded files, it does not provide guaranteed end-to-end encryption of your report to CWT, and it does not guarantee that the CWT email inbox stores messages encrypted at rest. Email between the web server and the CWT inbox uses TLS when both mail servers support it, which is common but not guaranteed for every mail hop. If these properties matter for the information you are about to send, adjust what you include in the report, or contact CWT through the main website about an alternative channel.
Who can see your report
Reports are accessible to authorized CWT personnel responsible for reviewing suspicious activity submissions. CWT limits access to individuals with a direct need to review incoming reports.
The hosting provider (HostGator) has technical access to the server, including uploaded files and server logs, as is standard with shared web hosting. CWT does not share reports with the hosting provider, but the provider could technically access server-stored data.
Sharing with law enforcement
CWT is not a law enforcement agency and does not automatically share reports with law enforcement. However, CWT reserves the right to share information from a report with law enforcement if:
- CWT believes there is a credible and immediate threat to someone's safety
- CWT is required to do so by law (e.g., a subpoena or court order)
- The information may be relevant to an active law enforcement investigation and CWT chooses to cooperate
CWT will use its judgment in deciding whether and when to share information. If you indicated in your report that a situation involves an ongoing threat, CWT may treat that as a factor in deciding whether to involve law enforcement.
Cookies, tracking, and external requests
CWT does not set its own cookies on this site and does not use analytics services, tracking pixels, or advertising scripts. The site does, however, load two external resources from Google, described below. These requests expose your IP address and basic browser information to Google, and Google's own cookies and scripts are loaded into the page when the verification widget runs.
- Google Fonts — the Lora typeface is loaded from
fonts.googleapis.com. Every page load makes a request to Google's servers for the stylesheet and font files. - Google reCAPTCHA v2 — the report form includes a Google reCAPTCHA "I'm not a robot" checkbox to reduce automated submissions. Loading the form causes your browser to download scripts from
www.google.com/recaptchaandwww.gstatic.com, and reCAPTCHA sets its own cookies and collects information about your browser and activity to decide whether to challenge you. When you submit the form, a verification token is sent to Google to be checked before CWT accepts the report. If verification fails or Google cannot be reached, your submission is rejected with an error.
Both Google services are governed by Google's own Privacy Policy and (for reCAPTCHA) Terms of Service. CWT does not control what Google does with that data. If you do not want to share any information with Google, do not submit the form.
Data retention
CWT retains reports in its email system for as long as CWT determines they are useful for the purposes described above. There is no automatic deletion schedule.
Uploaded files are retained on the server until CWT manually removes them.
If you submitted a report that contains your personal information and you would like it deleted, contact CWT through the main website. CWT will make reasonable efforts to locate and remove the information, but cannot guarantee deletion from all backups or systems.
This site is not an emergency service
This form is not monitored in real time. Reports are reviewed by CWT personnel, not by law enforcement or emergency services. CWT does not dispatch responders. If you or anyone else is in immediate danger, call 911 or your local emergency services.
Contact
For questions about this privacy notice, to request deletion of your personal information, or to report a concern about data handling, contact CWT at christianwarriortraining.com.
Changes to this notice
CWT may update this notice as the site changes. The current version will always be available at this page.