Find a Show
01 Mar, 2020 - Fresno
15 Mar, 2020 - Elk Grove
26 Apr, 2020 - Hayward
02 Aug, 2020 - Lodi
30 Aug, 2020 - Sacramento
27 Sep, 2020 - Santa Clara
11 Oct, 2020 - Sacramento North
Search Wedding Providers
Bakeries, Wedding Cakes, Cupcakes, & Sweets
Bridal Gowns & Wedding Dresses
Caterers & Food Trucks
DJ's | Disc Jockeys
Florists & Floral Designers
Jewelry & Engagement Rings, Wedding Bands & Wedding Party Gifts
Photographers | Photography
Wedding Consultants, Event Designers & Wedding Coordinators
Wedding Gift Registry
Wedding Venues, Reception Halls, & Hotel Banquet
Become an Exhibitor
Get an Exhibitor Kit
Host a Networking Mixer
Host an International Wedding Festival
Why Exhibit at IWF
Host a Networking Mixer
Host an International Wedding Festival
Ticket Refund Policy
The Perfect Day Begins with Planning
What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, phone number or other details to help you with your experience.
When do we collect information?
We collect information from you when you register on our site, place an order, subscribe to a newsletter, respond to a survey, fill out a form or enter information on our site.
How do we use your information?
We may share information you provide on our website when it is necessary to comply with the law or to protect the rights, property, or safety of our website, users, or others.
The information you submit, with the exception of credit card data, may be provided to exhibitors, web site advertisers and other affiliates. By submitting information to the site, you acknowledge that this information may be provided to these parties and give permission for these parties to contact you with information and special offers. Do not submit any information which you do not wish us to provide to these parties.
How do we protect visitor information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user places an order to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use 'cookies'?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.
If you disable cookies off, some features will be disabled that make your site experience more efficient and some of our services will not function properly.
However, you can still place orders.
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide you with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others.
However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Third party links
Occasionally, at our discretion, we may include or offer third party products or services on our website. These third party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.
We have not enabled Google AdSense on our site but we may do so in the future.
California Online Privacy Protection Act
According to CalOPPA we agree to the following:
Users can visit our site anonymously
Users are able to change their personal information:
By emailing us
How does our site handle do not track signals?
We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third party behavioral tracking?
It's also important to note that we do not allow third party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email
Within 7 business days
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.