Privacy Header Item 1
ripple background


The Park County Travel Council recognizes the importance of protecting your personal information. Any personal information that we collect on our Web site with the consent of our visitors helps us to better understand our Web site visitors so that we can serve them better in the future and keep them up-to-date with what is happening in Park County, Wyoming.

It is important to note that the Park County Travel Council does not collect any personal information without providing you with prior notice. We also do not use cookies that are used to collect personal information about our Web site visitors. All Web site traffic analysis that is conducted by the Park County Travel Council is through the use of server log file analysis and interpretation.

What about spam?
Subscribers will not receive any unsolicited emails or correspondence if they have not provided the Park County Travel Council with prior permission. From time to time we may use email as a way to keep in touch with our Web site visitors; however, we do not send “spam” (unsolicited marketing e-mail). If you agree to receive email communications from us, every email message we send to you will include an email address to which you can respond. If at any time you decide you do not want to receive marketing email from us, simply let us know and we will remove your name and email address from our mailing list.

When you leave this site
This policy discloses the privacy practices for our Web site. However, our site contains links to other sites. Once you link to another site, you are subject to the privacy and security policies of the new site. We encourage you to read the privacy policies of all Web sites you visit, especially if you share any personal information.

Site Security
Users are prohibited from violating or attempting to violate the security of the site. By way of example, you are prohibited from (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security without proper authorization; (c) attempting to interfere with service to any user, host or network; (d) sending unsolicited mail, including promotions and/or advertising of products or services.