Privacy Policy

The Stevens Point Area Convention & Visitors Bureau respects your privacy, and we are committed to protecting personally identifiable information you may provide us through our Website and social media accounts. We have adopted this Privacy Policy to explain what information may be collected on our Website and how we use this information.

The Stevens Point Area Convention & Visitors Bureau requires an e-mail address for entry into this Sweepstakes. The e-mail address you provide must be valid (notification of a Sweepstakes win will be sent via e-mail). By providing us with your e-mail address you agree to receive e-newsletters from the Stevens Point Area Convention & Visitors Bureau at the provided e-mail. You may opt out of this communication at any time. We will not sell your e-mail with any third party, but the information you provide may be subject to disclosure pursuant to Wisconsin Public Records law.

Other information requested during the registration for this Sweepstakes is collected for our research purposes only, and will not be shared or sold to any third party.

Security
We have implemented security measures we consider reasonable and appropriate to protect against the loss, misuse and alteration of the information under our control. Please be advised, however, that while we strive to protect your personally identifiable information and privacy, we cannot guarantee or warrant the security of any information you disclose or transmit to us online and are not responsible for the theft, destruction, or inadvertent disclosure of your personally identifiable information. In the unfortunate event that your "personally identifiable information" (as the term or similar terms are defined by any applicable law requiring notice upon a security breach) is compromised, we may notify you by e-mail (at our sole and absolute discretion) to the last e-mail address you have provided us in the most expedient time reasonable under the circumstances; provided, however, delays in notification may occur while we take necessary measures to determine the scope of the breach and restore reasonable integrity to the system as well as for the legitimate needs of law enforcement if notification would impede a criminal investigation. From time to time we evaluate new technology for protecting information, and when appropriate, we upgrade our information security systems.