Who On Our Team Has Access
Members of our team have access to the information you provide us. For example, both Administrators and Shop Managers can access:
- Order information like what was purchased, when it was purchased and where it should be sent, and
- Customer information like your name, email address, and billing and shipping information.
Our team members have access to this information to help fulfill orders, process refunds and support you.
With Whom May The Information May Be Shared?
Personally Identifiable Information about Authorized Customers may be shared with other Authorized Customers who wish to evaluate potential transactions with other Authorized Customers. We may share aggregated information about our Visitors, including the demographics of our Visitors and Authorized Customers, with our affiliated agencies and third party vendors. We also offer the opportunity to opt out of receiving information or being contacted by us or by any agency acting on our behalf.
What Choices Are Available To Visitors Regarding Collection, Use And Distribution Of The Information?
Visitors and Authorized Customers may opt out of receiving unsolicited information from or being contacted by us and/or our vendors and affiliated agencies by responding to emails as instructed, or by contacting us.
What Organizations Are Collecting The Information?
In addition to our direct collection of information, our third party service vendors (such as credit card companies, clearinghouses and banks) who may provide such services as credit, insurance, and escrow services may collect this information from our Visitors and Authorized Customers. We do not control how these third parties use such information, but we do ask them to disclose how they use personal information provided to them from Visitors and Authorized Customers. Some of these third parties may be intermediaries that act solely as links in the distribution chain, and do not store, retain, or use the information given to them.
What Partners Or Service Providers Have Access To Personally Identifiable Information From Visitors And/or Authorized Customers On The Site?
Embedded Content From Other Websites
Content on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
How Does The Site Keep Personally Identifiable Information Secure?
All of our employees are familiar with our security policy and practices. The Personally Identifiable Information of our Visitors and Authorized Customers is only accessible to a limited number of qualified employees who are given a password in order to gain access to the information. We audit our security systems and processes on a regular basis. Sensitive information, such as credit card numbers or social security numbers, is protected by encryption protocols, in place to protect information sent over the Internet. While we take commercially reasonable measures to maintain a secure site, electronic communications and databases are subject to errors, tampering and break-ins, and we cannot guarantee or warrant that such events will not take place, and we will not be liable to Visitors or Authorized Customers for any such occurrences.
How Long We Retain Your Data
We may hold some data indefinitely. Data related to credit card transactions may be held for at least a year in case of disputes. Other data with such needs to be kept for certain amounts of time will be kept to satisfy the time needed. All data legally required to be kept for certain timeframes will be kept to meet legal requirements. All other data will be kept or deleted as deemed appropriate. If you have any concerns please contact us.
How We Handel Security
The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security. We use modern encryption and force SSL connections. We take all reasonable steps to protect users.