ICMPhotoMag Network | ICM Photography Magazine | StephJohnPhoto Group assure you that we are committed to protecting the privacy of all members and visitors to this website. We will strive to ensure the information you provide is kept secure and managed within the General Data Protection Regulations.
ICMPhotoMag Network | ICM Photography Magazine | StephJohnPhoto Group, as the data collectors, may collect personal information from members and visitors to this site. This information is used to respond to inquiries, to monitor site usage, and to correspond with community members. Email addresses received as part of an inquiry are only retained as long as the inquiry remains open.
By submitting your data, you hereby consent to the use of that information as set forth above.
Where personal data is requested through forms, such data is only used for the purpose stated on the form and will not be given or sold to any third parties.
The personal information you supply when you join the membership community or the website mailing list will be held and used by ICMPhotoMag Network | ICM Photography Magazine | StephJohnPhoto Group to keep you up-to-date with membership information, events, news, products, and subscriptions.
Each email we send you gives you the opportunity to unsubscribe at any time, or you can ask to do this by filling out the Contact Form.
If you would like to amend the information you have provided or think our records are incorrect, please use the Contact Form to update us.
Cookies and logging of IP addresses may be used to enable ICMPhotoMag Network | ICM Photography Magazine | StephJohnPhoto Group to monitor site traffic and repeat-visitor statistics. These statistics will not include information that can be used to identify any individual. Such information is anonymous and held on a temporary basis.
ICMPhotoMag Network | ICMPhotography Magazine | StephJohnPhoto Group will at all times comply with the requirements of the GDPR. We are committed to ensuring your information is secure, and we will take all steps reasonably necessary to protect this information against unauthorized access and use.