Information Collection and Use
Our primary goals in collecting personal information are to provide you with a smooth, efficient, and customized experience, to send you information upon your request, and to thank you for your support of the programs and causes we support.
In general, we automatically gather certain usage information, such as the number and frequency of visitors to this site. This information may include which URL you just came from, which URL you next go to, what browser you are using, and your IP address. We use such data only in the aggregate. This collective data helps us determine how much our visitors use parts of the site, and do internal research on our users’ demographics, interests, and behavior to better understand and serve you. In addition, we may aggregate data and disclose such information in a non-personally identifiable manner to advertisers and other third parties for marketing and promotional purposes. In these situations, we do not disclose any information that could be used to identify you personally.
Personally Identifiable Information
If you choose to make a donation we will request personally identifiable information about you, such as your name, address, phone number, email address and debit/credit card information. In addition, we may use such information to improve our marketing and promotional efforts, to analyze site usage, improve our content and product offerings, and customize our site’s content, layout and services. If you affirmatively agree by clicking “yes” when prompted, we may use information to contact you and deliver information to you, such as through e-mail updates.
If you sign up for any of our services which allows you to invite your friends to donate to us, we will not sell these email addresses to anyone, nor will we use them for any purpose other than inviting them to donate at your request.
Unless you specify that a donation be “anonymous” or otherwise request that your name not be listed, we list the names of donors who give $1000 and up in some brochures and benefit programs to recognize the generosity of those who have given to our cause. We do not sell our donor lists to anyone, nor do we include them in any direct mail solicitations.
We may use internal service providers to facilitate our services, and therefore, may provide some of your personally identifiable information directly to them. In addition, we employ other companies and individuals to perform functions on our behalf, such as sending postal mail and email, removing repetitive information from donor lists, analyzing data, processing credit card payments and providing customer service. These companies and individuals have access to personal information needed to perform their functions, but may not use it for any other purpose.
“Cookies” are small files placed on your hard drive; each web site can send its own cookie to your browser if your browser preferences allow it. You can configure your browser to accept all cookies, reject all cookies, or notify you when a cookie is set. (Each browser is different, so check the “Help” menu of your browser to learn how to change your cookie preferences.) You are always free to decline our cookies if your browser permits, although in that case you may not be able to use certain features on our site, and you may be required to re-enter your password more frequently during a session. In addition, a number of companies offer utilities designed to help you visit web sites anonymously.
If you donate on our site, we will save your email in a cookie.
We care about the security of your transactions and use standard industry practices to safeguard your credit card information. We use high-grade encryption and the secure https protocol to communicate with your browser software, which guards against interception of the credit card information you give us. We also employ several different security techniques to protect your personally identifiable information from unauthorized access by users inside and outside the organization. You should be aware, however, that “perfect security” does not exist on the Internet; third parties may unlawfully intercept or access transmissions or private communications. You should not expect that your personally identifiable information will remain private