Alaskan Outlaw Privacy Policy.

Privacy Policy

Last updated: 15 October 2020

Alaskan Outlaw Productions LLC ("us", "we", or "our") operates https://akoutlaw.com and http://akulfhednar.akoutlaw.com (the "Site"). This page informs you of our policies regarding the collection, use, and disclosure of Personal Information we receive from users of the Site.

We use your Personal Information only for providing and improving the Site. By using the Site, you agree to the collection and use of information in accordance with this policy.

 

Information Collection And Use

While using our Site, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally, identifiable information may include but is not limited to your name, email address, mailing address, possibly religious affiliation.

 

Log Data

Like many site operators, we collect information that your browser sends whenever you visit our Site ("Log Data").

This Log Data may include information such as your computer's Internet Protocol ("IP") address, browser type, browser version, the pages of our Site that you visit, the time and date of your visit, the time spent on those pages, and other statistics.

In addition, we may use third-party services such as Google Analytics that collect, monitor, and analyze this data to further define the demographics of our viewers to target the associated advertising and marketing. At no point do we authorize our third-party services access to individual personal data (name, physical address, etc).

 

Communications

We may use your Personal Information to contact you with newsletters, marketing or promotional materials, and other information that is distributed to further our podcast advertising. We may also use personal contact information to verify our listeners/viewers do not miss our standard distribution channels.

 

Cookies

Cookies are files with a small amount of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your computer's hard drive.

Like many sites, we use "cookies" to collect information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Site.

 

Security

The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

 

Changes To This Privacy Policy

This Privacy Policy is effective as of 1 January 2020 and will remain in effect except with respect to any changes in its provisions in the future, which will be in effect immediately after being posted on this page.

We reserve the right to update or change our Privacy Policy at any time and you should check this Privacy Policy periodically. Your continued use of the Service after we post any modifications to the Privacy Policy on this page will constitute your acknowledgment of the modifications and your consent to abide and be bound by the modified Privacy Policy.

If we make any material changes to this Privacy Policy, we will notify you either through the email address you have provided us or by placing a prominent notice on our website.


Content Management Policies

Our Primary advertiser for our Site is Google Adsense, which has additional policies that we concur 100% with.

Illegal content

We do not allow content that:

  • is illegal, promotes illegal activity, or infringes on the legal rights of others.

Intellectual property abuse

We do not allow content that:

  • infringes copyright. It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (DMCA). You can file a counter-notification via this form.
  • sells or promotes the sale of counterfeit products. Counterfeit goods contain a trademark or logo that is identical to or substantially indistinguishable from the trademark of another. They mimic the brand features of the product in an attempt to pass themselves off as a genuine product of the brand owner. We are not responsible for advertisers on this site who may offer "knock-off" products, which are not counterfeit, and will immediately ban any advertiser who is found to be offering counterfeit goods. 

Endangered or threatened species

We do not allow content that:

  • promotes the sale of products obtained from endangered or threatened species. Examples: Sale of tigers, shark fins, elephant ivory, tiger skins, rhino horn, dolphin oil. Furthermore, designated "protected" products (ie. Eagle feathers, etc) must be accompanied by evidence of permission to obtain and retain said item (ie, membership in a tribe, etc).

Dangerous or derogatory content

We do not allow content that:

  • incites hatred against, promotes discrimination of or disparages an individual or group on the basis of their race or ethnic origin, religion, disability, age, nationality, veteran status, sexual orientation, gender, gender identity, or other characteristics that are associated with systemic discrimination or marginalization. Examples: Promoting hate groups or hate group paraphernalia, encouraging others to believe that a person or group is inhuman, inferior, or worthy of being hated.
  • harasses, intimidates, or bullies an individual or group of individuals. Examples: Singling out someone for abuse or harassment, suggesting a tragic event did not happen or that victims or their families are actors or complicit in a cover-up of the event.
  • threatens or advocates for physical or mental harm to oneself or others. Examples: Content advocating suicide, anorexia, or other self-harm; promoting or advocating for harmful health or medical claims or practices; threatening someone with real-life harm or calling for the attack of another person; promoting, glorifying, or condoning violence against others; content made by or in support of terrorist groups or transnational drug trafficking organizations, or content that promotes terrorist acts, including recruitment, or that celebrates attacks by transnational drug trafficking or terrorist organizations
  • relates to a current, major health crisis and contradicts authoritative, scientific consensus.
  • exploits others through extortion. Examples: Predatory removals, revenge porn, blackmail.

Enabling dishonest behavior

We do not allow content that:

  • promotes any form of hacking or cracking and/or provides users with instructions, equipment, or software that tampers with or provides unauthorized access to devices, software, servers, or websites.
    Examples: Pages or products that enable illegal access of cell phones and other communications or content delivery systems or devices; products or services that bypass copyright protection, including circumvention of digital rights management technologies; products that illegally descramble cable or satellite signals in order to get free services; pages that assist or enable users to download streaming videos if prohibited by the content provider
  • enables a user, or promotes products and services that enable a user, to track or monitor another person or their activities without their authorization. Examples: Spyware and technology used for intimate partner surveillance including but not limited to spyware/malware that enables a user to monitor another person’s texts, phone calls, or browsing history; GPS trackers specifically marketed to spy or track someone without their consent; promotion of surveillance equipment (e.g. cameras, audio recorders, dash cams, nanny cams) marketed with the express purpose of spying
    This does not include (a) private investigation services or (b) products or services designed for parents to track or monitor their underage children.

Misrepresentative content

We do not allow content that:

  • misrepresents, misstates, or conceals information about you, your content, or the primary purpose of your web destination.
  • entices users to engage with content under false or unclear pretenses.
  • engages in "phishing" for users’ information.
  • promotes content, products, or services using false, dishonest, or deceptive claims. Example: "Get Rich Quick" schemes
  • make claims that are demonstrably false and could significantly undermine participation or trust in an electoral or democratic process. Examples: information about public voting procedures, political candidate eligibility based on age or birthplace, election results, or census participation that contradicts official government records
  • falsely implies having an affiliation with, or endorsement by, another individual, organization, product, or service. Examples: Impersonating Google products, misusing company logos
  • deceives users through manipulated media related to politics, social issues, or matters of public concern.
  • is about politics, social issues, or matters of public concern directed at users in a country other than your own, if you misrepresent or conceal your country of origin or other material details about yourself.

Coordinated Deceptive Practices 

We do not allow:

  • Coordination with other sites or accounts and concealing or misrepresenting your identity or other material details about yourself, where your content relates to politics, social issues, or matters of public concern.
  • Directing content about politics, social issues, or matters of public concern to users in a country other than your own, if you misrepresent or conceal your country of origin or other material details about yourself.

Malicious or unwanted software

We do not allow content that:

  • contains malicious software or "malware" that may harm or gain unauthorized access to a computer, device, or network. Examples: Computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, rogue security software, and other malicious programs or apps
  • violates Google's Unwanted Software policy. Examples: Failure to be transparent about the functionality that the software provides or the full implications of installing the software; failing to include Terms of Service or an End User License Agreement; bundling software or applications without the user's knowledge; making system changes without the user's consent; making it difficult for users to disable or uninstall the software; failing to properly use publicly available Google APIs when interacting with Google services or products

Sexually explicit content

We do not allow content that:

  • includes graphic sexual text, image, audio, video, or games. Examples: Sex acts such as genital, anal, and/or oral sex; masturbation; cartoon porn or hentai; graphic nudity.
  • contains non-consensual sexual themes, whether simulated or real. Examples: Rape, incest, bestiality, necrophilia, snuff, lolita or teen-themed pornography, underage dating.
  • maybe interpreted as promoting a sexual act in exchange for compensation. Examples: Prostitution, companionship and escort services, intimate massage, cuddling sites.

Mail order brides

We do not allow content that:

  • facilitates marriage to a foreigner Examples: Mail order brides, international marriage brokers, romance tours

Adult themes in family content

We do not allow content that:

  • is made to appear appropriate for a family audience, but contains adult themes including sex, violence, or other depictions of children or popular children’s characters that are unsuitable for a general audience.

Child sexual abuse and exploitation

We do not allow content that:

  • Sexually exploits or abuses children or content that promotes the sexual exploitation or abuse of children. This includes all child sexual abuse materials.
  • Endangers children. Including but not limited to:
    • ‘Child grooming’ (for example, befriending a child online to facilitate, either online or offline, sexual contact and/or exchanging sexual imagery with that child);
    • ‘Sextortion’ (for example, threatening or blackmailing a child by using real or alleged access to a child’s intimate images);
    • Sexualization of a minor (for example, content that depicts, encourages, or promotes the sexual abuse or exploitation of children); and
    • Trafficking of a child (for example, advertising or solicitation of a child for commercial sexual exploitation).

We will take appropriate action, which may include reporting to the National Center for Missing & Exploited Children and disabling accounts. If you believe a child is in danger of or has been subject to abuse, exploitation, or trafficking, contact the police immediately. If you have concerns a child is being or was being endangered in connection with our products, you can report the behavior to Google.

Cooperate with local and federal law enforcement authorities

We will:

  • fully cooperate with local and federal law enforcement agencies in electronic investigations and/or monitoring activities.
  • freely provide registration information to local and federal law enforcement agencies.
  • freely provide all electronic logging information from all our sites at request by local and federal agencies.

Contact Us

If you have any questions about this Privacy Policy, please contact us at info@akoutlaw.com.

Alaskan Outlaw, Alaskan Outlaw podcasts, Alaska Ulfhednar, and AgedAKGoalie are registered trademarks of the Alaska Outlaw Productions LLC. 2020

Alaska Outlaw Privacy Policy