We collect and store information that you voluntarily provide to us when you purchase a product, respond to a survey, sign up for a promotion or enter a contest sponsored by the Site. When you purchase a product, you provide your name, mailing address, email address, telephone number and credit card information in order to complete the transaction. If you enter a contest or sign up for a promotion, you provide your name and email address. At times, you may be asked to voluntarily provide demographic information such as address, age range, gender, occupation, interests or hobbies.
When you access our Site, our web server automatically collects and stores your domain name, the date and time you access our Site, and the Internet address of the website that linked you to our Site.
The Company uses the information it collects from you in a variety of ways including to process your purchase transaction, to improve the content of our Site to address your preferences and to attract new users, to track user trends and patterns on the Internet so that we may inform users about products and services that may be of interest to them and, in some instances, to properly credit third parties that have referred you to the Site. Stored information is also used to pre-populate information fields for purchases, contests or promotions.
You may also unsubscribe from any email list by sending us an email at email@example.com. Please be aware that it may take up to 48 hours for your change to take effect.
In the event that the Company merges with another company, transfers or sells substantially all of its assets to a third party, all collected information stored on our server would be included in the merger, transfer or sale. Also, if required by law, individual information may be disclosed to a third party.
To prevent unauthorized access, maintain data accuracy and ensure the correct use of personal information, the Company uses appropriate industry standard procedures to safeguard the confidentiality of personal information including the use of firewall, encryption, token authentication, application proxies, monitoring technology and adaptive analysis of network traffic to track abuse of our network and its data. All transmissions of information are through secure computer servers, which also run authentication and Secure Sockets Layer ("SSL") 128-bit software data encryption software to encrypt all personal information including your name, address and credit card number so that it cannot be read as the information travels over the Internet. Access to registered users' accounts is password protected.
If you have any questions about privacy, please email us at firstname.lastname@example.org.