Thank you for taking the time to visit Senator Young's web site. Senator Young greatly values your personal privacy, and our office does not collect any personal information from visitors unless you choose to provide it.
Sometimes the Senator likes to highlight comments from constituents that are sent to our office via email or postal mail in speeches, in the Congressional Record, or in other public ways to ensure that the perspectives of the people of Indiana are heard in the national debate. In such cases, our staff will do everything we can to contact the author before sharing the comments. However, if your comments are intended to be confidential, please note that in the message and we will ensure that your comments are not shared beyond our office.
Please be aware that this site may contain links to sites outside of the U.S. Senate. When you link out of our site, please be aware other sites have different privacy policies.
We will share threatening or potentially unlawfully communications with law enforcement agencies.
- The U.S. Senate website is provided as a public service by the Office of the Secretary of the Senate, the Office of the U.S. Senate Sergeant at Arms, and the U.S. Senate Committee on Rules and Administration. Postings to the Senate web site must be in accordance with the U.S. Senate Internet Services Usage Rules and Policies adopted by the Committee on Rules and Administration on November 9, 2015.
- Information presented on this site is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.
- For site management, information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
- For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
- Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
- Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
- If you have any questions or comments about the information presented here, please forward them to firstname.lastname@example.org.