WHAT PERSONAL INFORMATION DO WE COLLECT?
Information You Provide. We receive and store information you enter. For example, when you buy a product or when you supply information such as your address, phone number or credit card. We use the information that you provide for such purposes as responding to your requests, customizing future shopping for you, improving our website, and communicating with you. We do NOT supply your information to other companies.
HOW DO WE USE YOUR INFORMATION?
Customized Shopping. We use your information to better serve you by providing a customized shopping experience. Agents. We employ other companies and individuals to perform functions on our behalf. Examples include delivering packages, sending postal mail and e-mail, and processing credit card payments. They have access to personal information needed to perform their functions, but may not use it for other purposes.
We may send you special offers from time to time, unless you choose to “opt-out” of receiving such offers.
As we continue to develop our business, we might sell or buy stores or assets. In such transactions, customer information generally is one of the transferred business assets. Also, in the unlikely event that we are acquired, customer information will be one of the transferred assets.
If we receive a lawful court order to release account or other personal information then we will comply with the law. We will also release information when necessary to protect the life, safety or property of others. This includes exchanging information with other companies and organizations for fraud protection and credit risk reduction.
HOW DO WE PROTECT THE SECURITY OF YOUR INFORMATION?
- We work to protect the security of your information during transmission by using Secure Sockets Layer (SSL) software, which encrypts information you input.
- We use encryption to protect your information contained in our customer list.
- We use a firewall to protect against unlawful intrusion.
- We limit access to your information on a “need to know” basis.
- It is important for you to protect against unauthorized access to your computer. Be sure to sign off when finished using a shared computer.
- No system can guarantee absolute security, just as the finest lock can not guarantee physical security. However, we take every reasonable precaution to assure that your data is secure.