The National Cancer Institute (NCI) respects the privacy of visitors to our Web site. We collect a limited amount of information on usage of the Web site for statistical purposes, in order to measure the number of visitors to the various sections of our site and to help us make our site more useful to visitors.
The U.S. Department of Health and Human Services, and the National Cancer Institute do not disclose, give, sell, or transfer any personal information about your visit unless required by law to do so.
When inquiries are e-mailed to us, we store the question and the e-mail address information so that we can respond electronically. Unless otherwise required by statute, we do not identify anyone who sends questions or comments to our web site. We will not obtain any information that will allow us to personally identify you when you visit our site, unless you chose to provide such information to us.
Links to Other Web sites
Costprojections.cancer.gov has links to many other Web sites, including some sites which are maintained by non-governmental organizations or private companies. The NCI is not responsible for the contents of any "off-site" Web page referenced from this server. Specifically:
- The NCI cannot guarantee the privacy or security of information you provide to these other Web sites. You should review their privacy policies as well if you have concerns.
- Reference in this Web site to any specific commercial products, process, service, manufacturer, or company does not constitute endorsement or recommendation by the U.S. Government or the NCI.
The information provided using this Web site is only intended to be general summary information to the public. It is not intended to take the place of either the written law or regulations.
This site is maintained by the U.S. Government. It is protected by various provisions of Title 18, US Code. Violations of Title 18 are subject to criminal prosecution in federal court.
For site security purposes and to ensure that this service remains available to all users, we employ software programs to monitor traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from these sources may be used to help identify an individual.