Terms and Conditions
Welcome to the official web site of Stitt for Governor 2018, an Oklahoma gubernatorial committee. Your right to privacy online is important. You do not have to identify yourself or divulge personal information unless you choose to provide your personal information. The following section enumerates our data collection, protection, and security policies. Feel free to contact us if you have any questions.
What we collect and how we use it:
We only collect personal information that you provide. In our effort to grow our grassroots community online and to collect donations in accordance with Oklahoma election law, Stitt for Governor 2018 may at times ask you to submit information - such as your name, address, phone number, email address, and employer/occupation information - in an effort to provide you with important campaign updates and/or to properly report your donations.. These updates include campaign events, videos, messages, alerts, and other campaign related information. These updates and communications that we send you may be personalized. While Stitt For Governor 2018 certainly will not sell your information to a commercial entity, it may, from time to time, share your information with like-minded organizations and candidates who are committed to the same principles of Stitt For Governor 2018. Stitt For Governor 2018 may provide your email address or other personal information to authorized third parties required to deliver a particular service. These third parties may not use your information for any other purpose than to carry out the services they are performing for The Stitt For Governor 2018.
Information Collected:
We utilize log files to better serve you. We use log files to assess the aggregate level of traffic to stittforgovernor.ichooseapex.com/donate including what pages people are visiting, and to diagnose any potential problems with the Web site. This log file does contain an "Internet Protocol" or IP address that gives us insight on the general geographic area that visitors are coming from but not information on a specific individual. We do not use log files to track a particular individual's use of stittforgovernor.ichooseapex.com/donate. All users remain anonymous unless they choose to give us personally identifiable information. Information collected by Stitt For Governor 2018 is Non-Personally Identifiable ("Non-PII") which includes IP host address, browser type, computer operation system, date and time of an ad request, and Internet Service Provider details. This information is identified using cookies, which are designed to serve users more desirable and relevant content while browsing the host site. This increases user experience, web functionality, and ultimately sorts information to increase accessibility to site visitors.
Donation Information:
When you donate to Stitt for Governor 2018, state law requires us to use our best efforts to obtain the following information: your name, mailing address, employer, occupation, and the amount of your contribution. Any credit card information provided is only used to immediately process your donation. Stitt for Governor 2018 does not retain your credit card information once the donation is processed online.
Children should not submit any personal information:
In accordance with the Federal Children's Online Privacy Protection Act of 1998 (COPPA) Stitt For Governor 2018 does not knowingly collect information from children. Additionally, in accordance with (COPPA), Stitt For Governor 2018 will never knowingly collect personal identifiable information from persons 13 years old or younger. Parents with any questions may contact us.
Security:
stittforgovernor.ichooseapex.com/donate is a secure site, and employs a host of industry best practices to protect the exchange of information between site visitors and its host site. Our site uses multiple methods of security and protection including firewalls and encryption. Our site uses a secured/encrypted server for online credit card donations. Our committee has put in place appropriate physical, electronic and managerial procedures to prevent unauthorized access.