Upon contributing to Test Wiki, certain information such as web browser and IP address are collected and stored by the software that Test Wiki operates on. This information is kept in a private log that can only be accessed by users with CheckUser rights, and is kept private to only those with the access to view the CheckUser logs on Test Wiki. If you contribute to Test Wiki anonymously, or without logging in to a registered account, your IP address is publicly stored in association with the contributions you make.
Data collected upon account creation
Upon registering a user account on Test Wiki, certain information will be collected such as a username, password, and optionally your real name to associate with your contributions to Test Wiki. Your username, and if you supply one, your real name, is publicly accessible by any visitor on Test Wiki. Your password is kept private on the Test Wiki server. It is your responsibility to keep your password private to only yourself.
The Test Wiki software allows users to specify their gender in their preferences. This information can be displayed publicly. If you do not wish to share your gender, a registered user may choose to not specify their gender in Special:Preferences.
When creating an account on Test Wiki, it is recommended that you specify a valid email address to associate with the account. Your email address is not publicly visible unless you use the Special:EmailUser feature, which allows for direct user-to-user email conversation. These conversations are not overseen by Test Wiki, and it is your responsibility to practice internet safety when communicating through email. Additionally, specifying an email address allows for email notifications from Test Wiki, which can be selected or modified from Special:Preferences.
It is a long-standing practice on this wiki that individuals engaging in:
excessive vandalism with intent of causing mayhem beyond reasonable definition of "testing", harassment, stalking or otherwise discomforting other users of the wiki, and other disruptive behavior, deserve to have their privacy violated, at the discretion of the stewards or sysadmins. This may involve a public release of all and any available information that is otherwise considered private, or any other action that would limit further damage.