Wisconsin laws exist to ensure that government is open and that the public has a right to access appropriate records and information possessed by the state government. At the same time, there are exceptions to the public's right to access public records provided by both state and federal laws. These exceptions include the limited privacy rights of individuals.
Information collected by this application becomes public record and may be subject to inspection and copying by the public unless an exception in law exists. When using the Department of Natural Resources Hunt Wild WI mobile application, information that is not readily identifiable to the user is automatically collected and stored. This information is collected for the necessary function of application features and to improve DNR services.
In the event of a conflict between this Privacy Notice and the Wisconsin Open Records Law or other law governing the disclosure of records, the Wisconsin Open Records Law or other applicable law will control.
Information collected and how it is used
If the user browses or downloads Wisconsin DNR information while using the Hunt Wild WI mobile application, the department automatically collects or logs the following information about each visit:
- The Internet Protocol address and domain name used but not the email address. The Internet Protocol address is a numerical identifier assigned either to the user’s Internet service provider or directly to the user’s device. The Internet Protocol Address is used to direct Internet traffic to the user’s device;
- When launching the application, the User ID, date, time, user location and hunting species selected;
- When saving an offline map locally on the user’s device, the User ID, date, time, user location and spatial scale of a saved map;
- When saving waypoints and tracks, the User ID, date, time, user location, location and format of saved waypoints and tracks;
- When planning a trip, the User ID, date, time, date of proposed trip and species of the proposed trip;
- When consulting the regulations, the User ID, date, time, user location, species selected and regulation category selected;
- When creating notifications, the User ID, date, time, species selected, type of notification, and the date and time of notification.
These application logs are continually analyzed to help:
- Improve the application by knowing the most popular features.
- Identify hunting trends by species, dates and times.
- Determine the locations of where Wisconsin DNR customers recreate, including the use of public lands.
- Allow the Wisconsin DNR to better allocate resources to meet customer needs both on the ground and in customer service systems. This data is securely stored and used for Wisconsin DNR business needs.
The above information is retained in accordance with Wisconsin Open Records Law.
Personal information and choice
"Personally identifiable information" is information about an individual that is readily identifiable to that specific individual. Personal information includes the user’s legal name, date of birth, Social Security Administration account number, street address, telephone number, Internet protocol address and email address. The state collects the information detailed in the previous section Information Collected and How it is Used when the user voluntarily logs into the application and with each specific function of the application.
If personal information is requested on the application or volunteered by the user, state law and the federal Privacy Act of 1974 may protect it. However, the information provided is public record and may be subject to public inspection and copying if not protected by federal or state law.
Users are cautioned that the collection of personal information requested from or volunteered by children in the application may be indistinguishable and may also be subject to public access.
The Wisconsin Department of Natural Resources, as manager of the application, has taken several steps to safeguard the integrity of its telecommunications and computing infrastructure, including but not limited to authentication, monitoring, auditing and encryption. Security measures have been integrated into the design, implementation and day-to-day practices of the entire department operating environment as part of its continuing commitment to risk management.
This information should not be construed in any way as giving business, legal, or other advice. This information should not be construed as warranting as fail-proof the security of information provided through department supported applications.