Data & Privacy FAQ
Do you have an Information Privacy and Protection Policy?
Yes, we publish our data privacy and protection policy online at
Do you have a Chief Data Officer or Data Privacy Manager?
Yes, they can be reached via email at email@example.com .
Do you use encryption and other means of obfuscation to protect confidential data?
Yes, we use encryption and obfuscation methods throughout our internal and external systems, including secure data transfer.
Do you have a training program for employees who have access to and handle customer confidential data?
Yes, we established this before we shipped our first product as an acknowledgement of our commitment to data privacy and protection principals based on widely known, well documented industry standards.
Does your data comply with applicable laws?
Yes, our data was collected in compliance with all federal and state laws. The records in the database are compiled from high quality and reputable sources.
Is your data acquired with the user’s knowledge?
Yes, the data in our database is self-reported information. A subscriber had to voluntarily disclose their information.
Is your data opt in?
Yes, all contributors’ data collection points must meet specific requirements to be considered third party opt-in.
Is your data from multiple sources?
Yes, the database is built from contributions from data partners such as online and offline retailers, online destination sites (i.e. travel or shopping portals), online communities, magazine subscriber files and sweepstakes/game (non-casino) sites.
Is data provided to you by commercial customers for processing isolated from other customer data?
Yes, all commercial customer data licensed to us for processing is stored as an isolated data set. We do not comingle, mix or combine commercial customer data with our proprietary data other licensed data sources, except during permitted usage and for processing as necessary to fulfill contracted services and is be retained in a merged or combined state.
Is your data maintained and revalidated regularly?
Yes, the database is managed on a regular basis based on usage and performance. The following emails are removed from our database:
- Recipient opts-out are removed with every refresh.
- Recipient complainers are removed or contacted within 24 hrs.
- Email hard bounces (i.e. email address is no longer deliverable, this is determined by the returned information after sending to a specific email address) are removed with every refresh.
Can I submit a complaint regarding my data or your usage of my data?
Yes, we have as Chief Data Officer who reviews all emails sent to firstname.lastname@example.org and responds within 24 hours.
How rigorous is your data quality and verification?
All data we use has triple verified data via a process that triangulates every data record of individual contacts, not just households. All files are updated monthly, with full re-builds quarterly. Our database meets all DMA privacy and security compliances, all e-mail is 100% CAN-SPAM compliant and hygiene includes: NCOA, deceased scrub, DMA Pander suppression, address standardization and CASS certification.
Does this data comply with CAN-SPAM?
Yes, we comply with CAN-SPAM. All records have had the opportunity to opt-in to receive 3rd party marketing offers.
Does this data file meet DMA privacy and security compliances?
Yes, we only carry data on those 18 years old or older. We do not maintain Social Security numbers, driver’s license numbers, credit card data or FICO Scores.
What are your sources of data?
Our data is gathered from many data points and sources such as:
- Public and courthouse records
- Real property information
- Phone directories
- Consumer surveys
- Self-reported and purchase transactions
- Response source contributors
- Niche segmentation schemes and premium datasets
- Destination and online sites
- Proprietary interactive campaign results
So how good is your coverage compared to other data sources?
Coverage compares favorably to industry leaders. Most clients compare our database versus competitive options based on:
- Breadth and depth of our data selectors
- Cohesiveness of offerings
Do you perform annual network security assessments?
Yes, we review major changes to the environment such as a new system component, network topology, firewall rule, etc. as well as conduct vulnerability testing.