A2IM is a 501(c)(6) not-for-profit trade organization representing a diverse group of over 500 Independently owned American record labels. A2IM’s independent community includes music labels of all sizes and staffing levels across the United States, from Hawaii to Florida, representing musical genres as diverse as our membership, including Bluegrass, Blues, Children’s, Classical, Comedy, Country, Dance/electronic, Gospel, Folk, Hawaiian, Jazz, Hip-Hop, Latin, Metal, New Age, Pop, R&B, Reggae, Roots, Soca/Caribbean, Traditional American, World, and more.
“Independent” doesn’t refer to a specific genre of music, nor does it mean lesser-known artists. For example, A2IM member labels have issued music releases by artists including Taylor Swift, Mumford & Sons, The Lumineers, Adele, Alabama Shakes, Arcade Fire, Run the Jewels, Bon Iver, and many others.
A2IM supports a key segment of America’s creative class and small business community. As an organization, we are committed to protecting the value of America’s Independent musical contributions and influence.
A2IM is uniquely positioned to serve as a central voice for a diverse community of Independent labels operating within the United States. The A2IM organization represents Independents’ interests in the marketplace, in the media, on Capitol Hill, and as part of the global music community.
Our website address is: https://a2im.org.
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
On A2IM.org we use contact forms to collect basic information used to both contact you and verify membership. The information we may ask to collect are as follows:
We also use contact forms to submit applications for Membership. The information that we request is used solely to qualify you for membership. The information we may specifically ask to collect to qualify for membership are as follows:
The information that you provide to us is kept indefinitely unless requested for removal. We may use some of your information for Marketing purposes, but you will receive a request to opt out before implementation.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Additionally, if you would like to opt out of Google Analytics, please refer to this link to a tool that is provided by Google: https://tools.google.com/dlpage/gaoptout
If you leave a comment on A2IM.org, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
Any information provided through a contact form or Membership application on A2IM.org will be stored indefinitely unless explicitly requested for removal.
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Visitor comments may be checked through an automated spam detection service.
For any Privacy-Specific concerns, please e-mail us at firstname.lastname@example.org
You can also submit any privacy-specific concerns through a form located here: https://a2im.org/support/
Since Cloudflare’s content delivery network serves A2IM.org we are protected from various data breach types. The following solutions are provided to protect from breaches:
DNSSEC verifies DNS records using cryptographic signatures. By checking the signature associated with a record, DNS resolvers can verify that the requested information comes from its authoritative name server and not a man-in-the-middle attacker. This is how we prevent against DNS Spoofing.
Fast SSL / TLS encryption at the edge of Cloudflare’s network, automated certificate management, and support for the latest security standards enable the secure transmission of sensitive customer data without fear of exposure.
Cloudflare offers granular control through Rate Limiting to detect and block hard-to-detect attacks at the network edge, defined by custom rules that set request thresholds, timeout periods, and response codes.
Cloudflare automatically filters out illegitimate traffic targeting the application layer through web application firewall (WAF) rulesets, including GET and POST-based HTTP requests.
To understand more about SSL & TLS read here: https://en.wikipedia.org/wiki/Transport_Layer_Security