How we collect and use information
You do not have to identify yourself or provide your name, address, telephone number, e-mail address (“Personal Information”) to use the Site.
If you should choose to give us your Personal Information, you decide how much information to provide. At various points we ask for your e-mail address, thoughts and comments. We will use your e-mail address to provide you news and information about Issues Management Group.
Our general policy is not to make your Personal Information available to anyone other than our staff and agents. We may make Personal Information available to organizations with similar political objectives and viewpoints for the purpose of advancing our own political objectives.
We treat your first name, city, state, and any comments as Public Information. We may make your comments along with your first name, city, and state available to the public.
Non-identifiable website visitor data may be collected and used in aggregate to help shape, direct, and improve content of the Site.
We are required by state law to collect and report the name, address, occupation, and employer of individuals who make contributions to Issues Management Group. This information is made publicly available by the government agencies with whom the committee files its reports.
IP Addresses and Log File Data
The IP address is the location of your computer or network on the Internet. We log your IP address for systems administration and troubleshooting purposes. We also use page hits in the aggregate to track the popularity of pages that people visit in order to improve the quality of the Site. There is no Personal Information collected in our log files.
Opting Out Information
Subscribers to our email list may terminate their subscriptions via a link at the bottom of each email sent from issuesgroup.com.
Changes to Your Information
You may change your subscriber information or change your information, at any time by contacting us at email@example.com.
The Site has a number of security measures in place to protect against the loss, misuse or alteration of the information under our control. Computer systems have restricted access limited only to those persons and organizations necessary to its proper functioning. This access applies to all electronic and physical security measures. Highly sensitive data including credit card information is additionally secured through the use of encryption, such as the Secure Socket Layer (SSL) protocol. Our servers are located in a locked, secure environment.