This Privacy Policy has been written to better serve those who care about how their ‘Personally Identifiable Information’ (PII) is used online. As described in the US Privacy Act and Information Security, PII is information that, alone or in combination with other information, can identify, contact or locate a person, or identify an individual in context. Please read our Privacy Policy carefully to get a clear understanding of how we collect, use, protect or process personally identifiable information in accordance with our website.
Q : What personal information do we collect from people who visit our blog, website or app?
A : When ordering or registering on our site, you may be asked to provide your name, email address, mailing address, phone number, credit card information or other details that will help you with your experience.
Q : When do we collect information?
A : We collect information from you when you register on our site, place an order, subscribe to our newsletter, open a support ticket or enter information on our site.
Q : How do we use your information?
A : We may use the information we collect from you when you register, make purchases, sign up for our newsletter, respond to surveys or marketing communications, shop on our website or use certain other site features in the following ways:
• Personalize your experience and enable us to provide you with the types of content and product offers you are most interested in.
• To better serve you when responding to your customer service requests.
• To expedite transactions.
Q : How do we protect your information?
A : Our website is regularly scanned for security holes and known vulnerabilities so that you can visit our site as safely as possible.
We use regular Malware scans.
Your personal information is contained behind a secure network and is accessible only to a limited number of people who have special access to the system and are required to keep the information confidential. Additionally, any sensitive/credit information you provide is encrypted via Secure Socket Layer (SSL) technology.
In order to keep the user’s personal information safe, we implement various security measures when entering, submitting, and ordering access to the user’s information.
All transactions are processed through the gateway provider and are not stored or processed on our servers.
Q : Do we use ‘cookies’?
A : We do not use cookies for tracking purposes
You can choose to have your computer warn you whenever a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browsers are slightly different, check your browser’s help menu to learn the correct way to edit your cookies.
If you turn off cookies, some features that make your site experience more efficient may not work properly. In other words, it can make your site experience more efficient and not work properly.
Third Party Disclosure
We do not sell trade or transfer your personally identifiable information to external parties.
Third Party Links
We do not include or offer third party products or services on our website.
COPPA (Children’s Online Privacy Protection Act)
We have parental control under the Children’s Online Privacy Protection Act (COPPA) regarding the collection of personal information from children under the age of 13. The US consumer protection agency, the Federal Trade Commission, enforces the COPPA rules, which state what operators of websites and online services must do to protect children’s privacy and online safety.
We do not specifically market to children under the age of 13.
The Fair Information Practices
In order to comply with Fair Information Practices, the following actions will be taken in the event of a data breach:
We will notify you via email.
• Within 7 business days
Users will be notified through a notice on the site.
• Within 7 business days
We also agree to the Individual Remedy Principle, which requires that individuals have the right to legally pursue enforceable rights against non-compliant data collectors and processors. This principle requires that individuals not only have enforceable rights over data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.