PRIVACY POLICY

YOUR INFORMATION DATA COLLECTION AND USAGE

We will collect and use your personal information to enable you to:

1) subscribe to Ocean Climate Change’s direct marketing communications (Subscriber);

2) apply to, or support your membership in, a Ocean Climate Change (Member) including:

  • the Ocean Climate Change Leadership Corps and Membership access to RealityHubOceanClimateChange.org,
  • Climate Speakers Network,
  • a local Ocean Climate Change,
  • Ocean Climate Change Campus Corps, or
  • 100% Committed (each a Climate Reality Program); and

3) the purposes set out in more detail in this section.

If you are a Ocean Climate Change Member, you stay a Member until your membership is revoked or you withdraw your membershipTo support your membership and comply with the agreement between yourself and Ocean Climate Change, Ocean Climate Change retains your data during your membership.

Your information may be shared with the data Controllers listed above and some third parties, as described below.

WHAT WE COLLECT

Information that we collect through your use of our website including:

  • Device information such as operating system, unique device identifiers, the mobile network system;
  • Hardware and browser settings;
  • Date and time of requests;
  • The requests you make;
  • The pages you visit;
  • Search engine terms you used to reach our website;
  • IP address.

We use this information, including to:

  • Provide access to the website;
  • Develop new opportunities to interact via the website;
  • Improve our website and offers;
  • Identify issues with the website and users’ experience of it;
  • Monitor the way our website is used;
  • Maintain website security.

We use this information because:

  • We have a legitimate business interest in understanding how our website is accessed, how it is used and any problems users have with it across multiple devices.
  • We have a legitimate interest and a public interest in keeping our website free from malware, spyware, trojan horses, unauthorized entry, and third-party attacks like distributed denial of service attacks.