1. Use of your name, contact information, likeness – The contact information that you provide us during the registration process will not be shared with any party that is not affiliated with or participating in the conference. However, we will include your name and contact information (title, company address, phone number and/or email address) in an Attendee Roster that will be updated regularly on our on-line registration page, and will be distributed to other attendees and our sponsors at the conference in order to facilitate networking. We will also make your name and contact information available to other attendees on the conference mobile app, and may use your name on social media posts about the conference (i.e. Facebook, Twitter and Linked In). As the conference host, ICG may also use your contact information to let you know about other events and related information. Finally, we will be photographing and videotaping the conference. If any images of you are captured by our photographer or videographer, ICG may use those images in its marketing materials and in social media posts (i.e. Facebook, Twitter and Linked In). If you do not want your name, contact information or image shared with other attendees and our sponsors, or used in our marketing materials or updated to our social media sites, please contact as soon as possible us by sending your request via email to [email protected] If we receive such a request from you, we will publish only your name in the Attendee Roster and on the conference mobile app. No other information or images will be used or published
2. Refunds – We will not issue refunds for canceled registrations. If you are unable to attend, you may send a colleague in your place. So that the correct name and contact information can be included in our Attendee Roster please let us know by emailing [email protected] as soon as possible if a colleague will be attending in your place.
3. Security and Privacy – In order to protect your name, address, credit card and other sensitive information from misuse, loss or corruption, we have in place generally accepted standards of technological security, including but not limited to, Secure Sockets Layer. If you have any questions or concerns about information security, please do not hesitate to contact us at [email protected]