This Policy applies to information we collect:
- On this Website
- In electronic communications, such as e-mail and text messages, between you and this Website
- Through any third-party application by which you access data on this Website
How We Collect and Use Information
You do not have to identify yourself or provide your name, address, telephone number, e-mail address (“Personal Information”) to use the Site.
If you should choose to give us your Personal Information, you decide how much information to provide. At various points, we ask for your e-mail address, thoughts, and comments. We will use your e-mail address to provide you news and information about Marathon Strategies, LLC.
Our general policy is not to make your Personal Information available to anyone other than our staff and agents. We may make Personal Information available to organizations with similar political objectives and viewpoints for the purpose of advancing our own political objectives.
We treat your first name, city, state, and any comments as Public Information. We may make your comments along with your first name, city, and state available to the public.
Non-identifiable website visitor data may be collected and used in aggregate to help shape, direct, and improve the content of the Site.
We are required by state law to collect and report the name, address, occupation, and employer of individuals who make contributions to Marathon Strategies, LLC. This information is made publicly available by the government agencies with whom the committee files its reports.
IP Addresses and Log File Data
The IP address is the location of your computer or network on the Internet. We log your IP address for systems administration and troubleshooting purposes. We also use page hits in the aggregate to track the popularity of pages that people visit in order to improve the quality of the Site. There is no Personal Information collected in our log files.
Subscribers to our email list may terminate their subscriptions via a link at the bottom of each email sent from marathonstrategies.com.
Changes to Your Information
You may change your subscriber information or change your information, at any time by contacting us at [email protected].
How Long We Keep Information
We may keep information that will collect for an unlimited period of time.
Children’s Privacy Statement
To help ensure the safety and privacy of children, we comply with the Children’s Online Privacy Protection Act of 1998. We do not knowingly allow children under the age of 13 to publicly post or otherwise distribute personally identifiable contact information through the Site. The Site is not intended to solicit information of any kind from children under 13, and we have designed it to block our knowing acceptance of information from children under 13 whenever age-related information is requested.
If we become aware that we have inadvertently received personally identifiable information from a user under the age of 13 as part of the Site, we will delete such information from our records.
We take reasonable precautions to protect your information in an effort to prevent the loss, misuse, and unauthorized access, disclosure, alteration, and destruction. Please be aware, however, that despite our efforts, no security measures are perfect or impenetrable and no method of data transmission that can be guaranteed against any interception or other types of misuse.
Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser or looking for “https” at the beginning of the address of the web page.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.