At Safe Gatherings, privacy is very important to us. Your information is collected through the Safe Gatherings system in order to establish an account, provide access to our services, and to handle customer service and support.

By using the Safe Gatherings system, you expressly consent to the use and disclosure of your personally identifiable information to the organization with whom you are seeking approval and/or approval through, third party background check organizations, and, when necessary, our staff members who service your account.

Information We Collect

To utilize services provided by Safe Gatherings, you may be required to provide contact and identity information, billing information, and other personal information as indicated on the forms throughout our site. You always have the option to not provide such information, but this may not allow you to fully utilize our service’s features.

Under some circumstances we may require some additional financial information. We use your financial information, including credit card information, for billing purposes. Such information is passed to the merchant processor and does not remain on our system.

We use data collection devices such as “cookies” on certain pages of our site to help analyze web page flow, measure promotional effectiveness, and promote trust and safety. “Cookies” are small files placed on your hard drive that assist in providing customized services. We offer certain features that are only available through the use of a “cookie”. We also use cookies to allow you to enter your password less frequently during a session. Most cookies are “session cookies,” meaning that they are automatically deleted from your hard drive at the end of a session. You are free to decline our cookies if your browser permits, although in that case you may not be able to use certain features on our site and may be required to reenter your password more frequently.

Who Has Access to Your Information?

Your personal information and the answers you provide to questions is used by Safe Gatherings staff members to process your application or provide service on your account. In addition, background checks are conducted using premier third party background check systems. Background check results and personal information are reviewed and managed by the Safe Gatherings staff members.

Personal information such as your name address telephone number or email address is available to the account administrator for your organization. Safe Gatherings will not disclose or share any of your personal information that has been collected on our website with any third party except for your account’s administrative contact, background check providers, or as required by law or pursuant to a governmental request. We use information in your file solely to resolve disputes, troubleshoot problems and enforce our Terms and Conditions. You acknowledge that Safe Gatherings has the right to do so, and if there are any concerns that an organization is receiving information they should not have access to, please contact Safe Gatherings support staff immediately.

Other Information Collectors

To the extent that you disclose your information to other parties, different rules may apply to their use or disclosure of the information you disclose to them. Safe Gatherings may provide web links to other sites. We are not responsible for the content of those sites or their privacy policies.


The entire Safe Gatherings website utilizes a secure sockets layer (SSL) encryption. In addition, your stored personal information is encrypted to provide you with the greatest security possible.

Some personal information is deleted from the Safe Gatherings system upon successful completion of background reports.

Safe Gatherings uses industry standard practices to safeguard the confidentiality of your personal identifiable information, including “firewalls” and Secure Sockets Layers. We treat data as an asset that must be protected against loss and unauthorized access. We employ many different security techniques to protect such data from unauthorized access by users inside and outside the company. However, “perfect security” does not exist on the Internet.