The North Carolina State Capitol Foundation is Committed to Protecting Your Privacy.
What information we collect and how it is used:
If you choose to give to The North Carolina State Capitol Foundation, you must complete a membership or donation form about yourself. Our form asks you to provide us with your name, address, zip code, e-mail address, donation amount, membership type, and/or designation. You have the option of paying for your gift by credit card, or requesting billing by The North Carolina State Capitol Foundation. If you choose to pay for your gift by credit card, you must provide your credit card type, credit card number, and expiration date.
The North Carolina State Capitol Foundation operates under the highest privacy standards. We do not rent, trade, or sell our lists of donors.
Who has access to the information:
The North Carolina State Capitol Foundation employees and/or board members may access information collected about you in order to process your pledge and perform other administrative and business functions. The North Carolina State Capitol Foundation employees are required to sign a confidentiality agreement that prohibits employees from using or disclosing your information to third parties (other than for legitimate campaign purposes) during and after their employment with The North Carolina State Capitol Foundation.
How you can “opt out” of receiving communications from us:
We may use your demographic information to send you e-mails about The North Carolina State Capitol Foundation that may be of interest to you and to acknowledge your gift. You can opt out of receiving future email messages by checking the appropriate box on any of our forms.
Our commitment to data security:
To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online. Firewalls prevent outside parties from accessing our database server through the Internet, and physical access to the database server is restricted to authorized individuals. All credit card transactions are encrypted.