Restore The Fourth advocates for your right to keep your personal data secure, and we work to protect your personal data when you visit our websites and engage with us, online and offline.
We wrote this Data Usage Policy, and will update it as necessary, to let you know how we protect your personal data and keep it confidential.
We do not rent or sell visitor or donor information to third parties. We will not transfer or share this information unless compelled by law, or under the specific conditions listed below, and we will vigorously challenge any subpoena or other demand by government or private organizations or individuals to access it.
This Data Usage Policy applies to Restore The Fourth, and all of our board members, chapter leaders, volunteers, and others who are bound by confidentiality agreements with Restore The Fourth, and anyone to whom we have granted access to the personal data that we hold.
What we collect
We strive to collect as little personal data as we need to further our mission.
We collect information when you visit our site, make a donation online, and subscribe to our campaigns or mailing lists. We’ll let you know what information is required for each action, and try to require the least amount of information necessary.
To donate to Restore the Fourth using Bitcoin or other cryptocurrencies, we must collect account addresses that we receive your contributions from.
Restore The Fourth’s website and services are not intended for, or designed to attract, individuals under the age of 18. We do not knowingly collect personally identifiable information from any person under the age of 18.
Our website is HTTPS enabled for your security. It collects four cookies. Three of these are “_cfduid” cookies set by Cloudflare for the purpose of speeding up page load times, and do not contain any personal information. The fourth, “PYPF”, is set by PayPal as part of its “Smart Buttons” process, and we do not guarantee that it does not collect information entered as part of making a PayPal donation.
Your internet service provider may collect browsing information from you that would reveal the fact that you have visited this website. For future visits, we recommend downloading and using the encrypted Tor browser (www.torproject.org).
How we store and use your data
We take industry standard security measures to protect personal information under our control from loss, misuse, and breach. However, like with every website, there are risks associated with uploading your information online.
When you are asked for your personal information, you are sharing that information with Restore The Fourth alone, unless stated otherwise. We use this information to further our mission, by ensuring our work serves users at risk around the world and reaches the stakeholders whose decisions impact our fundamental human rights online.
You retain the right to view and request copies, deletion, and modification of the personal data we collect from you. Contact our Technology Chair Ed Quiggle at firstname.lastname@example.org to start exercising these rights.
Some data we collect from you on our website, including donor, mailing list subscription and campaign information, is stored in our donor database. Donor information will be stored in the donor database until the donor modifies it or requests deletion. The donor database and mailing list database are stored in encrypted form on a Cryptpad server.
We do not have full credit card numbers available to us, displayable or downloadable.
Credit card information is stored by payment providers including Paypal, Bitcoin, and others as noted on payment pages.
The www.restorethe4th website is stored on servers of GoDaddy, Inc.
Restore The Fourth information and services are provided “as-is,” with all faults, and without a guarantee or warranty of any kind, whether express or implied. With the exception of our amicus briefs, no materials on our website should be construed as having been written by or reviewed by an attorney, or to constitute legal advice. Though we intend to provide the best possible service and expert technical guidance, we cannot guarantee that the information or services we provide are completely accurate or reliable, or will meet all user’s requirements, or be uninterrupted, timely, secure, or error free. You understand and expressly agree (1) to use our information and services at your sole risk, (2) that any material, information and/or data downloaded or otherwise obtained through Restore The Fourth is at your own discretion, and (3) that you are solely responsible for damage to your computer system, loss of data, or any other harms that may result from the download or use of such material, information and/or data.
Limitation of Liabilities
Restore The Fourth will not be liable for damages of any kind resulting from the use of or the inability to use our information and services. In particular, we are not liable for the loss of, unauthorized access to, or alteration of a user’s transmissions or data or for the cost of procurement of substitute information, goods, and services, including but not limited to damages for loss of profits, use, data or other intangibles, even if Restore The Fourth or any of its authorized agents had been advised of the possibility of such damages or were negligent.
If any provision of this Agreement is declared invalid or unenforceable, the remaining provisions of this Agreement will remain in effect. We will post notice of any changes to these terms at least 30 days before they are implemented.
Termination of Service
Restore The Fourth reserves the right to refuse service to any person or organization, at any time.
Restore The Fourth may reject a request for support or decline to deliver further services if, in our sole determination, such activities would:
- Expose Restore The Fourth staff or partners to an unacceptable risk of physical, digital, or other attacks,
- Pose an unacceptable risk to Restore The Fourth’s reputation or interests,
- Involve illegal, unethical, violent, or immoral activity.
Updates and Contact
This policy is effective as of October 16, 2019.
We will archive all versions of this Data Usage Policy and provide links on this page.
As of the current date, we have not received any subpoena, warrant, National Security Letter, FISA court order, or other request for data from a law enforcement or other government agency relating to Restore The Fourth members or to users of www.restorethe4th.com. We are not aware of any successful intrusion into our servers or databases by a government entity. We have not been asked by a government agency to install any backdoors into our web site. Please pay close attention to any modifications made to our Warrant Canary and verify the cryptographic signature of this Warrant Canary by using our public GPG key:
—–BEGIN PGP PUBLIC KEY BLOCK—–
—–END PGP PUBLIC KEY BLOCK—–
For any questions or concerns, please contact Restore The Fourth’s Technology Chair Ed Quiggle at email@example.com.