Privacy is very important to us. As part of the normal operation of our services, your information is collected through UEvent, disclosed to your event host, used by the event host, and in some cases used by us to handle customer service and support.
By using or registering through UEvent, you expressly consent to our use and internal disclosure of your personally identifiable information to our staff members who service your account.
By using UEvent, we may require you to provide contact and identity information, billing information, and other personal information as indicated on the forms throughout our site. You always have the option to not provide such information, but this may not allow you to fully utilize the UEvent features. By registering, you are permitting us to disclose such information to the event hosts.
Under some circumstances we may require some additional financial information. We use your financial information, including credit card information to bill you for your use of our services. Such information is passed to the merchant processor and does not remain on our system.
We will not disclose or share any of your personal information that has been collected on our website with any third party except for your event host, or as required by law or pursuant to a governmental request.
We use your information to facilitate the services you request. We use information in the file we maintain about you, and other information we obtain from your current and past activities on the site, to resolve disputes, troubleshoot problems and enforce our Terms of Service.
To the extent that you disclose your information to other parties, different rules may apply to their use or disclosure of the information you disclose to them. UEvent may contain web links to other sites. We are not responsible for the content of those sites or their privacy policies.
UEvent uses industry standard practices to safeguard the confidentiality of your personal identifiable information, including "firewalls" and Secure Socket Layers. We treat data as an asset that must be protected against loss and unauthorized access. We employ many different security techniques to protect such data from unauthorized access by users inside and outside the company. However, "perfect security" does not exist on the Internet.