COLLECTING INFORMATION ABOUT YOU
You can visit and enjoy our website without disclosing any personal information about yourself. However, there may be times, such as when you subscribe to our e-newsletter or sign-up for our QUICK RESERVATION service, at which we will ask you to provide certain information about yourself. BY PROVIDING THIS INFORMATION, YOU ARE GIVING GSP AIRPORT AND ITS AGENTS PERMISSION TO USE YOUR INFORMATION AS DESCRIBED HEREIN, INCLUDING, WITHOUT LIMITATION, TO OFFER YOU PRODUCTS AND SERVICES THAT MAY BEST MEET YOUR FUTURE NEEDS.
As a governmental agency, we are governed by open records laws. Any information that we receive through use of our site is subject to the same provisions as information provided on paper. Otherwise, we do not share personal identifying information with any third party without your permission. We disclose only in aggregate form our statistical analyses or demographics of users to third parties. We will not share personal information with any third party without your permission.
This information is not reported or used in any manner that would reveal personally identifiable information, and will not be released to any outside parties unless we are legally required to do so in connection with law enforcement investigations or other legal proceedings.
GSP Airport will not use your information to send marketing or other material to you without your permission. You may grant such permission by signing up for the GSP eNewsletter and/or registering with the online Travel Center hosted by Travwell, Inc.
To help us serve you better, we collect information that does not identify you personally, but rather identifies your computer or browser. This is done by using files called “cookies” and by tracking IP addresses. Cookies operate in the background and can be turned off if you wish. If you choose not to accept cookies, some pages or services on the site may not function properly.
LINKS TO OTHER SITES
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.