Internet and Personal Information Privacy Policy
Wisconsin Travel Best Bets respects your privacy, and we are committed to protecting personally identifiable information you may provide us through our Website and social media accounts. We have adopted this Privacy Policy to explain what information may be collected on our Website and how we use this information.
Privacy Policy
Wisconsin Travel Best Bets requires an e-mail address for entry into this Giveaway. The e-mail address you provide must be valid (notification of a Giveaway win will be sent via e-mail). By providing us with your e-mail address you agree to receive e-newsletters from Wisconsin Travel Best Bets and from Best Bets destinations at the provided e-mail. You may opt out of this communication at any time.
We will not share or sell your e-mail with any third party.
Other information requested during the registration for this Giveaway is collected for our research purposes only, and will not be shared or sold to any third party.
Security
We have implemented security measures we consider reasonable and appropriate to protect against the loss, misuse and alteration of the information under our control. Please be advised, however, that while we strive to protect your personally identifiable information and privacy, we cannot guarantee or warrant the security of any information you disclose or transmit to us online and are not responsible for the theft, destruction, or inadvertent disclosure of your personally identifiable information. In the unfortunate event that your “personally identifiable information” (as the term or similar terms are defined by any applicable law requiring notice upon a security breach) is compromised, we may notify you by e-mail (at our sole and absolute discretion) to the last e-mail address you have provided us in the most expedient time reasonable under the circumstances; provided, however, delays in notification may occur while we take necessary measures to determine the scope of the breach and restore reasonable integrity to the system as well as for the legitimate needs of law enforcement if notification would impede a criminal investigation. From time to time we evaluate new technology for protecting information, and when appropriate, we upgrade our information security systems.