1. Information Collection and Use
2. Disclosure of Information
2.1 Event Information and Non-Identifiable Information: IAMAI may share Event information that may or may not include your personal information and may otherwise disclose non-identifiable Information to third parties for industry analysis, demographic profiling and other commercial and/or non-commercial purposes.
2.2 Compliance with Laws and Law Enforcement: IAMAI co-operates with government and law enforcement officials and private parties to enforce and comply with the law. IAMAI will disclose any information about the User that it collects to any governmental or law enforcement officials as IAMAI, in its sole discretion, believe necessary or appropriate to respond to claims and legal process (including but not limited to subpoenas), to protect the property and rights of IAMAI or a third party, to protect the safety of the public or any person, or to prevent or stop activity IAMAI may consider to be, or to pose a risk of being, any illegal, unethical or legally actionable activity.
2.3 Business Transfers: IAMAI may sell, transfer or otherwise share some or all of its assets, including any personal information, or non-identifiable information in connection with a merger, acquisition, reorganization or sale of assets or in the event of bankruptcy.
2.4 Account Information: The User agrees to keep confidential and not to disclose to any other individual or individuals for all time the User name and password related to their respective account.
4. Links to Third Party Websites
IAMAI is concerned with safeguarding the User information. IAMAI employs industry-standard encryption to protect data transmissions and other safety measures designed to protect information from unauthorized access. IAMAI will make any legally required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored "personal data" (as defined in applicable state statutes on security breach notification) to you via email insofar as consistent with (i) the legitimate needs of law enforcement or (ii) any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
6. Policy Changes
7. Modifications to Account Information and Preferences