30+ Things to do This Winter
Join the fun this winter in the Stevens Point Area with some of the best holiday events, breweries, outdoor activities, and more fun! Check out our…
The Central Wisconsin Tourism Association requires an e-mail address for entry into this Sweepstakes. The e-mail address you provide must be valid (notification of a Sweepstakes winner will be sent via e-mail). By providing us with your e-mail address you may also opt-in to receive e-newsletters from Central Wisconsin Tourism Association partners. You may opt out of this communication at any time. We will not sell your e-mail to any third party, but the information you provide may be subject to disclosure pursuant to Wisconsin Public Records law.
Other information requested during the registration for this Sweepstakes is collected for our research purposes only, and will not be shared or sold to any third party.
We have implemented security measures we consider reasonable and appropriate to protect against the loss, misuse, and alteration of the information under our control. Please be advised, however, that while we strive to protect your personally identifiable information and privacy, we cannot guarantee or warrant the security of any information you disclose or transmit to us online and are not responsible for the theft, destruction, or inadvertent disclosure of your personally identifiable information. In the unfortunate event that your "personally identifiable information" (as the term or similar terms are defined by any applicable law requiring notice upon a security breach) is compromised, we may notify you by e-mail (at our sole and absolute discretion) to the last e-mail address you have provided us in the most expedient time reasonable under the circumstances; provided, however, delays in notification may occur while we take necessary measures to determine the scope of the breach and restore reasonable integrity to the system as well as for the legitimate needs of law enforcement if notification would impede a criminal investigation. From time to time we evaluate new technology for protecting information, and when appropriate, we upgrade our information security systems.