fans and website users a diverse range of MU associated and MU branded offers (such as MU Finance offers) at competitive prices. MU and/or these commercial partners would like to contact you to tell you more about the offers available to you and about a range of other MU initiatives in a number of ways, including by post, telephone, text/picture/video message, digital television, fax or by email. If you express an interest in an offer from one of our commercial partners, that partner may let us know. This enables us to take your views and interests into account when choosing our commercial partners and developing the programme.
What to do if you do not want to receive details of offers
Please be assured, you are under no obligation to buy anything or to participate in any MU initiatives, however, if you prefer not to be contacted either by us or any of our commercial partners, you can opt out by clicking the relevant boxes on the screen upon which you provide information or by writing to us by mail or email (see the section "How to contact us" below). You can change your mind at any time.
Please note, if you do opt out of receiving information, we and/or our commercial partners will be unable to keep you informed of new services, products, events or special offers that may interest you and our ability to inform you of ticketing opportunities may be affected. Use of your information outside the European Union
In common with many other website operators, we may use standard technology called 'cookies' on this site. Cookies are small pieces of information that are stored by your browser on your computer's hard drive and they are used to record how you navigate this website on each visit.
Security of information
We take the security of your personal information seriously. When you submit your credit card details to us, we use industry standard Secure Sockets Layer (SSL) encryption technology to guard your information. In addition, we have security procedures in place to protect our paper based systems and computerised databases from loss and misuse, and only allow access to them when it is absolutely necessary to do so, and then under strict guidelines as to what use may be made of the personal information contained within them. Monitoring