The Arlington Democrats are committed to protecting the privacy and security of the personal information of our members and supporters. This policy outlines our practices for data access and usage.
The Arlington Democrats collect and store personal information from our members and supporters, including names, addresses, phone numbers, and email addresses. This information is collected through membership forms, event sign-ups, and online donations. All personal information is stored securely on third-party cloud-based servers and databases, which are protected by firewalls and other security measures.
Access to personal information is restricted to authorized Arlington Democrats officers and volunteers who require the information to perform their duties. All officers and volunteers who handle personal information are required to sign a confidentiality agreement and complete training on data privacy and security. Personal information is only used for legitimate Arlington Democrats activities, such as sending newsletters, event invitations, and donation solicitations. We generally do not sell or share personal information with third parties. However, because Arlington Democrats do support candidates for office, we make the following data sets and information available under the conditions stated below.
All usage of datasets must comply with the Controlling the Assault of Non-Solicited Pornography and Marketing ("CAN-SPAM") Act. In 2003, Congress enacted the Controlling the Assault of Non-Solicited Pornography and Marketing ("CAN-SPAM") Act to set a national standard for the regulation of spam email. See 15 U.S.C. § 7701(a)(11); S. Rep. No. 108-102 (2003), at 21-22. Among other things, the CAN-SPAM Act of 2003 prohibits the inclusion of deceptive or misleading information and subject headings, requires identifying information such as a return address in email messages, and prohibits sending emails to a recipient after an explicit response that the recipient does not want to continue receiving messages (i.e. an "opt-out"). See 15 U.S.C. § 7704(a); CAN-SPAM Act of 2003: Core Requirements.
| --- | --- |
Personal information is retained for as long as necessary to fulfill the purposes for which it was collected. Once personal information is no longer needed, it is securely deleted or destroyed.