Interested in sponsoring?
Hack the Hammer cares deeply about our users' privacy and personal data. In order to run the world class events that we do, we sometimes require personal data from our Hackers, Sponsors, Volunteers and other participants. We will always do our best to explain the use of this data in plain English and treat your data with the upmost respect in order to protect its privacy. In order to effectively run a hackathon, we collect certain data from users both on our website passively in the form of anonymous usage analytics as well as application data our hackers provide for us.
We collect analytics data on all of our web properties including but not limited to hackthehammer.com, our Facebook, and Instagram pages. This data is anonymous, aggregated, and may be shared publicly or privately with third parties in broad categories such as the number of visitors our properties receive per month or the general demographics of our traffic.
Application and Event Data
In order to participate at Hack the Hammer, we need to collect a minimum of information in order properly run the event. Some of this information may be shared with sponsors with your explicit permission for recruiting purposes. Information such as race, gender, age, and the like may be shared with sponsors and for anonymous demographic reports.
Information sent in emails, and other third party communication platforms and the like will be kept private to the Hack the Hammer team unless explicit permission is granted, by law enforcement.
How we keep your data safe
Hack the Hammer makes use of industry standard security and encryption techniques to gather and safeguard your data. Our infrastructure is hosted primarily in Heroku's data centers which use rigorous and industry standard physical security protocols to prevent physical attacks. Data access is strictly monitored internally with zero tolerance for unauthorized use. Access to application data is limited to the minimum number of organizers necessary while volunteers and other parties have limited access in order to facilitate basic operations such as check-in and registration on the day of.
Upon receipt of a written request with proof of identity via email sent to email@example.com, we will delete all associated personal data within 30 days. Please note that your data may remain in our rolling backups after this time but will not be utilized and will be deleted from any restored versions if necessary.
Credit for this document go to the following privacy policies:
Icon For Arrow-up