How Information is used
The personal information provided when placing an order is needed to complete the order. The information to used to verify a persons identity. This information is used to process credit card information. The information is used to process and ship the order. The information is used to track orders when needed. Information is not shared with outside parties except to delivery service companies, credit card processing agencies and banks, and other companies as required or allowed by law. The information may be shared with firms including accountants, solicitors, government agencies and other parties as may be required or allowed by law. The information may be used by contracted warehouses and freight lines necessary to fulfill the order in a timely manner.
The information provided about someone else for shipping purposes is used to ship the product and to confirm delivery. This information is not shared with outside parties except to the extent as described above.
Email addresses are used to answer emails received. Such addresses are not used for any other purpose except to provide important information about an order or which is believed to be of interest. Email addresses are shared with other parties, including internet service providers which are necessary to use in order to transmit e-mail replies.
Finally, Non-identifying and aggregate information may be used to better design our website and to share with advertisers and others. Personal identifiable information provided is never used or shared in ways related or unrelated to the ones described above without also providing you an opportunity to opt-out or otherwise prohibit such uses.
To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.
How Information Can be Accessed or Corrected
All personally identifiable information that is collected online and maintained can be accessed by saving email confirmations and/or making a request in writing. This procedure is used to better safeguard the information.
Factual errors in your personally identifiable information can be corrected by sending a request that credibly shows the errors.
To protect privacy and security, reasonable steps are taken to verify identity before making corrections.
Privacy Notice Revisions