This website, www.newaygocountyexploring.com is owned and operated by Newaygo County Tourism Council. We are strongly committed to protecting the privacy of our website users. The intent of our privacy statement is to inform you, the user, about the information that we may collect about visitors to our site, how we use that information and about our disclosure practices.
Newaygo County Tourism Council is committed to high standards that require honesty, integrity and fairness. Newaygo County Tourism Council will collect no personal information about you unless you choose to provide that information to us. We do not use techniques that collect personal information about you without your knowledge. You have the right to decline to have any information collected or transferred for marketing purposes.
What happens to your personal information?
All personal information that is collected on our website is stored in a secure location. At no time will we solicit personal information to third party vendors without prior consent, as we respect the privacy and confidentiality of our website visitors.
What about Spam?
Subscribers will not receive any unsolicited emails or correspondence if they have not provided Newaygo County Tourism Council with prior permission. From time to time, we may use email as a way to keep in touch with our website visitors; however, we do not send “spam” (unsolicited marketing e-mail). If you agree to receive email communications from us, every email message we send to you will include an email address to which you can respond. If at any time you decide you do not want to receive marketing email from us, simply let us know and we will remove your name and email address from our mailing list.
When you leave this site.
Security Policy Users are prohibited from violating or attempting to violate the security of the site. By way of example, you are prohibited from (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system of network or to breach security without proper authorization; (c) attempting to interfere with serve to any user, host or network; (d) sending unsolicited mail, including promotions and/or advertising of products or services.