top of page
Daisy fris fly 1 SM.jpg

DOG MODEL CALL FORM: OLDER DOGS

Thank you for your interest in modeling for Michelle Dawkins for this project.


  • Make sure to read the requirements before continuing with this application.


  • Please be very honest about your dog as this will help us determine if this model call will be the right fit for the both of us.


IMPORTANT NOTE: Michelle Dawkins and/or the Island Paws Photography Team will NEVER ask you to fill out any personal information beyond this secured form. If selected to model, you will be contacted privately by our team from the following emails:


INFO@ISLANDPAWSPHOTOGRAPHY.COM

MICHELLE@ISLANDPAWSPHOTOGRAPHY.COM


YOU WILL NEVER BE CONTACTED VIA SOCIAL MEDIA IN THE COMMENTS SECTION OR ASKED TO JOIN A NEW SOCIAL MEDIA PAGE


Michelle Dawkins and/or Island Paws Photography are not responsible for the actions of others however, we do want to bring up this matter and to remind you to always check the account name and/or email address if you think someone might be impersonating Michelle or someone from the Island Paws Photography Team.

Dogs Birthday
Month
Day
Year
Are you comfortable signing a Non Disclosure Agreement (NDA) with Michelle Dawkins?
Multi choice
  • If selected for this model call you will receive a private email from: info@islandpawsphotography.com or Michelle@islandpawsphotography.com

  • We will never let you know you have been selected via social media for these model calls.

  • DO NOT click or accept any links that are not from Michelle Dawkins or the Island Paws Photography.

  • We will never ask you for any personal or payment information!

  • Michelle Dawkins and/or Island Paws Photography are not responsible for the actions of any 3rd party.

  • How to Recognize Impersonation Attacks: 

    • Verify the sender's email address: Look for subtle differences in the domain name or email address.

    • Be wary of urgent requests: Impersonation attacks often create a sense of urgency to pressure victims. 

    • Be cautious of links and attachments: Avoid clicking on links or opening attachments from unknown or suspicious sources. 

    • Double-check website URLs: Make sure you are on the legitimate website before entering your credentials. 

    • Be skeptical of unexpected requests: Verify the legitimacy of any unusual requests, especially those involving money or sensitive information. 


bottom of page