We, at Those In Need, love youth.
They are creative, active, wired… and frustrated that our world is so messed up. Those In Need harnesses that awesome energy and unleashes it on causes teens care about. Almost every week, we launch a new campaign. The call to action is always something that has a real impact and doesn't require money, an adult, or a car. With a goal of 1 million active members by the end of 2020, Those In Need is one of the largest organizations in the India for teens and social change.
Because we believe in teens so much, we're also super-passionate about their safety, security, privacy, and other stuff like that.
This policy may change over time, so please check back every once in a while. (Like, the next time you are waiting in line to score Hunger Games movie tickets and you are totally bored? Come back and re-read this policy to pass the time.)
Those In Need is a closed community and email addresses are requested to participate in some of our member-only features. Our promise to you: If we collect information from you, we use it only for the purposes for which it was collected and the limited purposes outlined below. We will not sell or share your personally identifiable information with any third party. (Read: you're not going to be receiving random credit card offers in the mail because of us. Ew. We'd never do that.)
When Does Those In Need Collect My Personal Information?
When you share it with us by, for example: (1) sharing your email address, birthdate, phone number, or other information when subscribing to our newsletter or registering with us to form an account ("Account"), (2) sharing personal information when you post comments, (3) sharing contact information (e.g.., Twitter username and Facebook account name) through our contests or platform, (4) signing up to be a member online by email or Facebook Connect (5) participating in a survey where an email address is requested; (6) sharing other personal information with us through forms, contest entries, or other communications with us.
Also, whenever you visit the Services, we may passively collect certain information about your web browser, Internet Protocol Address ("IP Address"), or mobile device, through the use of "cookies" or other methods, as described more fully below.
In addition to that information, our analytics trackers may also collect other information. This may include the operating system you are working on, the Internet browser you are using, and the screen resolution of your computer. (Why would we want such random information? Our geeks use this information to know what kind of stuff to build, so that it works on all your gadgets.) Notice one source that is missing? That's right--we don't buy lists. We don't randomly scrape users from other websites or orgs. We know that other organizations do this sometimes to build their databases, but we don't do it. Bottomline: if we have collected your personal information, it's because you've shared it with us or signed up with us.
What Information We Collect and How We Use It
User Content. By default, all sharing through the Services is public, and when you provide us with content it is published so that anyone can view it. (Hence the term worldwide web. Your granny in Mumbai might see that photo and so will anyone else with Internet access.) Content published and shared publicly is accessible to everyone (including search engines and your ex-boyfriend's mom), so you may lose any privacy rights you might have regarding that content. In addition, information shared publicly may be copied and shared throughout the Internet, including through features native to the Services. While you are free to delete your Account, content can be like a vampire and live on through re-blogging of your content by others, and due to technological limitations inherent to the Services, copies of that content may exist elsewhere and be retained indefinitely, including in our systems. Simply, you can wear a necklace of garlic, but once you've posted stuff, it's super hard to kill it, even if Bunty is your bff. Information Related to Use of the Services. We collect information about how people use the Services, including those with an Account. It's not to be creepy; it's to help provide you with content that you want. This information includes general usage information, and may include information such as the number and frequency of our visitors, which pages or features of the Services they have visited, which links on the Services they have clicked on, and the length of those visits. We may also use third-party applications and services, such as Google Analytics and Quantcast, to collect and analyze this information. This information enables us and third parties authorized by us to figure out how often individuals use the Services so that we can analyze and improve them. Some of this information may be associated with the IP Address used to access the Services, and some may be associated with your Account, such as the topics you search for and the help pages that you visit. We may also use some of this information in aggregate form, that is, as a statistical measure related to all of our users that would not identify you personally. We use information about your use of the Services to improve and enhance your experience on the Services. (This information tells us to write more often about One Direction, and maybe not so much about the Jonas Brothers.)
Information Related to Your Web Browser. We automatically receive and record information from your web browser when you interact with the Services, such as your browser type and version, what sort of device you are using, your operating system and version, your language preference, the Services or a service that referred you to the Services, the date and time of each web request you make, your screen display information, and information from any cookies we have placed on your web browser (as described below). We also sometimes detect whether you are using certain web browser extensions and store that information in a manner associated with your Account. Web browser-related information is used to enhance your experience with the Services (for example, by personalization) and to allow us to improve the Services; it is not, however, used in a manner that would identify you personally.
IP Address Information. Under certain circumstances, such as when you log into the Services, load a web page from the Services, or send an "Ask" message anonymously, we may collect and store your IP Address. We generally use IP Address information to fight spam, malware, and identity theft; we also may use it, in the future, to personalize the Services for you. IP Address information is also used by us to generate aggregate, non-identifying, information about use of the Services.
Location Information. In some cases we collect and store information about where you are located, such as by converting your IP Address into a rough geolocation. We may use location information to improve and personalize the Services for you.
Information Related to Your Mobile Device. We may collect and store information related to your mobile device, such as your phone number, if you provide it to us. We may use this information to improve the Services, such as by allowing you to verify your Account by text message. Again, you can dump us anytime you like. Information Collected Using Cookies. While we'd prefer to eat warm white chocolate chunk cookies with a nice hot cocoa, we'll settle with using computer "cookies" to determine whether you have visited the Services previously and to save and remember any preferences that you set while using the Services. Our cookies cannot retrieve any other data from a hard drive or obtain an email address. Although a user has the ability to modify most browsers to either accept all cookies, notify the user when a cookie is sent, or reject all cookies, it may not be possible to utilize certain parts of the Services if cookies are rejected. Derived Information. We wanna get to know you. We analyze your actions on the Services in order to derive or infer characteristics that may be descriptive of you. These characteristics are used to improve and personalize the Services.
Email Tracking. We don't count our eggs before they hatch, so we may place information in our emails to you (such as a web beacon) that allows us to measure our email deliverability.
How Does Those In Need Use My Personal Information?
Depending on the portion of the Services that you have interacted with, we may use your information in a number of ways.We will never sell your email information or phone number nor will we ever sell or publish personally identifiable information. (And we think it's really icky that other organizations do this. Not cool.)
We don't share information we receive from you unless: (a) we have your permission to share that information; (b) we have given you prior notice that the information will be shared, and with whom; or (c) that information is aggregate information or other information that does not identify you. Information Shared with the Public Through the Services. As noted above, by default, content published through the Services is shared with the public, and this is an important feature of the Services. Because this kind of information can be seen by anyone and may be indexed by search engines, you should be careful in what you choose to disclose publicly and make sure it is information you want to share with everyone. Information Shared Between the Services. We may, if possible, aggregate information about your use of multiple Services and use that consolidated information to improve how the Services operate, and to develop new Services.
The Security of Your Information
Your Account information is protected by a password for your privacy and security. (Read: we aren't afraid to whoop computer-hacker booty.) You need to prevent unauthorized access to your Account and Personal Information by selecting and protecting your password appropriately and limiting access to your computer and browser by signing off after you have finished accessing your Account on the Services. We use reasonable administrative, technical, and physical measures to safeguard the privacy and integrity of your information (including your Account information), including but not limited to standard encryption methods, and various restrictions on who can access the information and the servers on which it is stored. However, we can't guarantee the security of any of your information, or the sufficiency of our security measures to prevent unauthorized access to it. Unauthorized access, interception, use, hardware or software failure, and other factors may compromise the security of user information at any time.
What Information You Can Access
If you are a registered user, you can access and delete most information associated with your Account by logging into the Services and checking your Account Settings page. Registered and unregistered users can access and delete cookies through their web browser settings.
We love free speech, and we don't censor content based on political or ideological point of view or of a critical nature. We do reserve the right to delete content that is off-topic, "spammy" in nature, abusive, uses excessive foul language, or includes ad hominem attacks. Frankly, we want content to be nice, constructive thoughts on how to create more great social change! So when we see someone post an ad for a free credit report score, we yank it. And, if you see content like this, please help us maintain our community by flagging it.
All content contributed to Those In Need must adhere to the following policy, and may be edited or removed at Those In Need's discretion if it is deemed to be in violation of this policy. Personal Attacks. It's not cool to launch personal attacks. Seriously. We're a charity trying to make the world a better place! Be nice to authors, other users, or any individual. We also don't tolerate persistent trolling or mindless abuse. The Those In Need community discusses topics by furthering the conversation maturely and informing the participants with resourceful and constructive ideas. Hate speech. Racism, sexism and homophobia will not be tolerated!
Language and Threats. Please watch your language and respect other people's views, beliefs and emotions. We reserve the right to remove any content that might be found extremely offensive or threatening. (Hopefully you learned the whole "play nice with others" thing a long time ago.)
No Spam. Spam in all forms is gross. It will be removed from our fridge, our shelves, our website, and anywhere else we find it lurking. Smear Tactics. Although we acknowledge criticism of our articles, our writers, and any other content or person represented on the Services, we will not allow misrepresentation. We will distinguish between constructive arguments and smear tactics.
Relevancy. Please keep conversations relevant. Off-topic content is subject to removal in order to keep the thread on track.
As a user, you are responsible for your own communications and are responsible for the consequences of posting. The views, opinions, and comments expressed on our message boards DO NOT reflect the views and opinions of Those In Need as an organization. Those In Need is a not-for-profit and does not directly support or push any political, social, or religious agendas. The world is a diverse place, and we love all of our users equally. (Unless Alia Bhatt became a Those In Need user. We might love her slightly more. But only slightly.) Content and pictures posted on the Services may be reused across the Services and in promotional materials. We reserve the right to use photographs uploaded to the Services in order to promote and publicize ourselves, our causes, and our mission. If you have questions email firstname.lastname@example.org
Every user in the Those In Need community acts as a moderator through the abuse-reporting system. Users are asked to 'if they see something, Those In Need' about inappropriate content. When inappropriate user generated content is found the owner may be contacted and the post may be edited or removed as needed. In the case of a message that suggests a user may be in danger (either from themselves or someone else), the user may be referred to email@example.com