- What personally identifiable information is collected from you through the web site. This includes how it is used, and with whom it may be shared.
- The choices you have available to you regarding the use of your data.
- How we protect your information from misuse. This section will tell you about the security procedures we have put in place to help protect you.
- What to do if you notice any inaccuracies in the information and how to correct them.
Information Collection, Use, and Sharing
The first thing you need to know is that we are the sole owners of the information collected on this site. This means that we only have access to/may collect information that you voluntarily give us. Usually, this is the information that is collected via email or as a result of direct contact from you. Your trust is important to us, so we will not sell or rent this information to anyone. We also won’t share your information with any third parties outside of our organization. There are exceptions to this of course. But the only times when we will are if we do need to do so in order to fulfill your request. A good example of when we would have to do this is if we need to ship something to you.
Your Access to and Control Over Information
Opting out of any future contact from us is easy and you can do it at any time. All you need to do is contact us via the email address or phone number (which you can find here).
Additionally, you may contact us to find out the following:
• You can see what data we have about you, if any.
• Change/correct any data we have about you.
• Have us delete any data we have about you.
• Express any concern you have about our use of your data.
Protecting your privacy is very important, and we are careful to protect your information. We employ a number of precautions to ensure that any information you submit via the website stays protected. Moreover, we endeavor to do so both offline as well as online.
Whenever we collect sensitive information (e.g. credit card data), we use encryption and the secure “https” communication protocol. You can easily verify this in two ways. The first is by looking for the closed lock icon at the bottom of your browser. The second is by looking at the address bar in your browser. Website addresses using the “https” protocol begin with “https”. Your browser may also additionally display the closed lock icon and ‘secure’ in the address bar too.
We protect your information offline by only allowing access to your information on a ‘need to know’ basis. In other words, only the employees who need the information to perform a specific job related to your case are granted access. Moreover, all of our computers/servers where your information is kept, are kept in a secure environment.