What personally identifiable information is collected from you through the web site, how it is used, and with whom it may be shared.
What choices are available to you regarding the use of your data.
The security procedures in place to protect the misuse of your information.
How you can correct any inaccuracies in the information.
Information Collection, Use, and Sharing.
We are the sole owners of the information collected on this SITE. We only have access to or collect information that USER voluntarily give us via email or other direct contact from USER. We do not sell or rent this information to anyone.
SITE will respond to a verified law enforcement, or other governmental department request or subpoena relating to a criminal investigation or alleged illegal activity. In such events, SITE will disclose information relevant to the investigation such as name, city, state, zip code, telephone number, email address, fraud complaints, and credit card information. SITE reserves the right to report to law enforcement agencies any activities that it believes, in good faith, to be unlawful.
USER Access to and Control Over Information.
USER can do the following, at any time, by contacting us via the email address or phone number given on our website:
Opt out of any future contact from us;
See what data we have about USER, if any;
Change or correct any data we have about USER;
Have us delete any data we have about USER; and
Express any concern you have about our use of USER data.
SecurityWe take precautions to protect USER information. When USER submits sensitive information via the website, USER information is protected both online and offline.
Whenever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. USER can verify this by looking for a closed lock icon at the bottom of USER web browser, or looking for "https" at the beginning of the address of the web page.
While we use encryption to protect sensitive information transmitted online, we also protect USER information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers and servers in which we store personally identifiable information are kept in a secure environment.