Privacy Policy

Men of Faith Ministries Inc.

Last Updated: January 28, 2025

Introduction and Legal Framework

About This Policy

Welcome to Men of Faith Ministries Inc. This Privacy Policy explains how we collect, use, and protect your personal information when you interact with our ministry, whether through our website, programs, services, or other activities.

We are committed to protecting your privacy and being transparent about our practices. This policy applies to all interactions with Men of Faith Ministries Inc. and covers how we handle information for participants, volunteers, donors, and community members.

This policy was last updated on August 13, 2025, and we will notify you of any significant changes.

Our Commitment to Privacy

Privacy protection is central to our ministry values. We believe that protecting your personal information is not just a legal obligation, but a moral and ethical responsibility that reflects our commitment to serving our community with integrity and care.

All staff and volunteers receive comprehensive privacy training and are required to follow strict data protection protocols. We regularly review and update our privacy practices to ensure they meet the highest standards.

We welcome questions and feedback about privacy and are committed to addressing any concerns promptly and transparently.

Information We Collect

Personal Information

We collect basic personal information necessary for ministry programs, including:

  • Names, addresses, phone numbers, and email addresses
  • Date of birth and age verification
  • Family information and relationships
  • Emergency contact details

We collect only the information necessary for ministry programs and always obtain your consent before collecting any personal information.

Program Participation Data

To provide effective ministry services, we collect information about your participation, including:

  • Program registration and attendance records
  • Progress tracking and assessments
  • Participation in events and activities
  • Feedback and evaluation responses

This information helps us provide better services, support individual development, and ensure safety and accountability.

Health and Medical Information

For physical development programs and safety purposes, we may collect limited health information, including:

  • Health assessments for physical programs
  • Medical conditions and allergies
  • Emergency medical information
  • Fitness and wellness data

Health information is collected only when necessary for safety and is treated with the highest confidentiality. You can choose not to provide certain health information.

Financial Information

We process financial information for donations and program fees, including:

  • Donation records and payment information
  • Program fees and payment history
  • Financial assistance applications
  • Tax receipt information

Financial information is processed securely, and we do not store complete payment card details. Donation records are maintained for tax purposes.

Photos and Videos

We may capture photos and videos for ministry purposes, including:

  • Event photography and videography
  • Program documentation and marketing materials
  • Social media content

Photos and videos require explicit consent, and you can opt-out of being photographed or filmed. Images are used only for ministry purposes.

Emergency Contact Information

For safety purposes, we collect emergency contact information, including:

  • Primary and secondary emergency contacts
  • Relationship to participant
  • Contact methods and availability
  • Authorization for emergency situations

Emergency contacts are essential for safety and are shared only in emergency situations. You can update this information at any time.

How We Use Your Information

Program Administration

Your information is used primarily for program administration, including:

  • Program registration and enrollment
  • Participant management and communication
  • Safety and security measures
  • Program evaluation and improvement

This ensures we can provide safe, effective programs and communicate important information about your participation.

Communication and Updates

We use your information to communicate about:

  • Program announcements and updates
  • Ministry news and events
  • Spiritual resources and materials

You can opt-out of non-essential communications, but emergency and program communications cannot be opted out of for safety reasons.

Safety and Emergency Response

Safety is our highest priority. We use information for:

  • Emergency situation response
  • Safety protocol implementation
  • Incident reporting and documentation
  • Coordination with emergency services

Emergency information is shared only when necessary and we coordinate with emergency services as needed.

Ministry Development

We use aggregated, anonymized data for ministry improvement, including:

  • Program evaluation and improvement
  • Ministry impact assessment
  • Fundraising and donor relations
  • Community outreach and engagement

Individual information is never used for these purposes without your explicit consent.

Special Protections for Minors

Age Verification

We verify age for all participants under 18 and implement special protections, including:

  • Age verification procedures
  • Parental consent requirements
  • Age-appropriate information collection
  • Verification documentation

We collect only age-appropriate information and maintain strict documentation of age verification.

Special Safeguards

Minors' data receives enhanced protection through:

  • Enhanced security measures
  • Limited access to sensitive information
  • Special training for staff working with minors
  • Regular review of minor data practices

Access is limited to essential staff only, and all staff receive special training for working with minors.

Data Sharing and Disclosure

Internal Sharing

Within our organization, information sharing follows strict protocols:

  • Staff access limited to job requirements
  • Volunteer access limitations
  • Internal communication protocols
  • Access control measures

All access is logged and monitored, and volunteers have minimal access to personal information.

Third-Party Service Providers

We use service providers for specific functions and ensure:

  • All providers meet our privacy standards
  • Service agreements include data protection requirements
  • Regular monitoring and oversight
  • Compliance verification

All third-party providers must meet our strict privacy standards and sign comprehensive data protection agreements.

Emergency Situations

In emergency situations, we may need to share information for:

  • Emergency response protocols
  • Information sharing in emergencies
  • Emergency contact procedures
  • Post-emergency review

We follow established emergency protocols and notify emergency contacts as appropriate.

Data Security and Protection

Security Measures

We implement comprehensive security measures, including:

  • Industry-standard technical security measures
  • Physical security protocols
  • Data encryption standards
  • Security monitoring and testing

Data is encrypted in transit and at rest, and security is regularly tested and updated.

Access Controls

Access to information is strictly controlled through:

  • User authentication requirements
  • Role-based access controls
  • Access logging and monitoring
  • Regular access review procedures

Access is limited by job role and need, and all access is logged and monitored.

Staff Training

All staff receive comprehensive privacy training, including:

  • Annual privacy training requirements
  • Training content and frequency
  • Training documentation
  • Training effectiveness assessment

Training is provided annually and as needed, with completion documented and effectiveness assessed.

Regular Assessments

We conduct regular security assessments, including:

  • Security assessment frequency
  • Assessment scope and methodology
  • Findings and remediation
  • Continuous improvement processes

Security is assessed regularly, covering all aspects of data protection, with findings addressed promptly.

Incident Response

We have established incident response procedures, including:

  • Incident identification procedures
  • Response team and responsibilities
  • Notification requirements
  • Recovery and prevention measures

Response teams are trained and ready, and we learn from incidents to prevent recurrence.

Your Rights and Choices

Access Your Information

You have the right to access your personal information:

  • Requests can be made in writing or electronically
  • We respond within 30 days
  • Some information may be withheld for legal reasons
  • Clear procedures for making requests

We provide clear procedures for accessing your information and respond promptly to all requests.

Correct Inaccurate Data

You can request correction of inaccurate information:

  • Correction request procedures
  • Verification requirements
  • Correction timeframes
  • Notification of corrections

We verify the accuracy of correction requests and complete corrections within 30 days.

Request Deletion

You can request deletion of your information:

  • Deletion request procedures
  • Deletion limitations
  • Deletion timeframes
  • Post-deletion confirmation

Deletion is completed within 30 days, though some information cannot be deleted for legal reasons.

Opt-Out of Communications

You can opt-out of non-essential communications:

  • Opt-out procedures
  • Communication types affected
  • Opt-out timeframes
  • Opt-in procedures

Opt-outs take effect within 10 business days, and you can opt back in at any time.

Contact and Updates

Privacy Officer Contact

Our privacy officer is available to help with any privacy-related questions or concerns:

Privacy Officer: [Name to be filled in]

Email: privacy@menoffaithministries.org

Phone: [Phone number to be filled in]

Response Time: Within 2 business days

How to Exercise Your Rights

To exercise your privacy rights, follow these steps:

  1. Contact our privacy officer
  2. Provide required documentation
  3. Specify your request clearly
  4. Allow time for processing

We provide clear procedures and respond within established timeframes.

Policy Updates

We notify you of policy changes through:

  • Update notification procedures
  • Change tracking and documentation
  • Review and approval processes
  • Implementation timeframes

Changes are tracked and documented, with updates reviewed and approved before implementation.

Questions and Concerns

We welcome questions and feedback about privacy:

  • How to ask questions
  • Complaint procedures
  • Resolution timeframes
  • External resources

Complaints are handled promptly, and we provide external resources when needed.

Questions About Your Privacy?

We're committed to protecting your privacy and being transparent about our practices. If you have any questions or concerns, please don't hesitate to contact us.

Contact Us

Last Updated: January 28, 2025