What information is collected?
When you visit our website you may provide us with two types of information: (1) personal information you knowingly choose to disclose that is collected on an individual basis; and (2) website use information collected on an aggregate basis as you and others browse our website.
Personal Information You Choose To Provide —
When you purchase a product or otherwise request/obtain information or services from our website, we may ask you for your name, address, phone numbers, e-mail address, and some other personal information. In addition, if you choose to correspond further with us through e-mail, we may retain the content of your e-mail messages, together with your e-mail address, and our responses. We provide similar protections for these electronic communications that we employ in the maintenance of information received by mail and telephone.
Website Use Information —
Similar to other commercial websites, our website utilizes a standard technology called “cookies” (see explanation below, “What Are Cookies?”) and web server logs to collect information about how our website is used. When you visit an Internet website, you disclose information about yourself, such as your Internet protocol (IP) address, the time of your visit, and the referring location (eg, the site or page that offered a link to us). Other information gathered through cookies and web server logs may include the pages viewed, the time spent at our website, and the websites visited just before and just after our website. We, like many other sites, record this basic information about visits to our website. This information is collected on an aggregate basis.
How & when information is used
Personal Information —
We use personal information for purposes of administering our business activities and providing products and services. We shall also be free to use or copy/publish all ideas, inventions, concepts,reviews, techniques or know-how contained in any communications you direct to us for any purposes, including disclosure to third parties and/or developing, manufacturing and/or marketing products or services. We may sometimes use other businesses to perform certain services for us, such as maintaining the website and our mailing lists, processing orders and delivering products, sending postal mail and providing marketing assistance and data analysis. We may provide personal information to those businesses when that information is necessary for them to complete a requested transaction or otherwise perform their duties. We will take reasonable steps to ensure that these third party service providers are obligated to protect your personal information on our behalf. As we develop, we may buy other businesses or their assets or sell our business or assets. Customer information is generally one of the business assets involved in such transactions. Thus, in the event that we or substantially all of our assets are acquired, customer information would be one of the transferred assets.
Website Use Information —
We use website browser software tools, such as cookies and web server logs, to gather information about the browsing activities of visitors to our website in order to improve our website and better serve our visitors. This information assists us to design and arrange our web pages in the most user-friendly manner and to continually improve our website to better meet the needs of our visitors. We also use this information for purposes of system administration and to report aggregate information. Cookies help us collect important business and technical statistics. The information in the cookies lets us trace the paths followed by visitors to our website as they move from one page to another. Web server logs allow us to count how many people visit our website and evaluate our site’s visitor capacity.
What are cookies?
Cookies are a feature of web browser software that allows web servers to recognize the computer used to access a website. They are small pieces of data that are stored by a user’s web browser on the user’s hard drive. Cookies can remember what information a user accesses on one web page to simplify subsequent interactions with that website by the same user or to use the information to streamline the user’s transactions on related web pages. This makes it easier for a user to move from web page to web page and to complete commercial transactions over the Internet. Cookies are used to make your online experience easier and more personalized.
Who has access to the information?
Except as described herein, we will not willfully disclose any individually identifiable information about our users to any third party without first receiving that user’s permission. However, we may disclose personal information when we believe in good faith that the law requires it or to protect our rights or property. When you give us personal information, you are consenting to the disclosures as described herein.
How we protect your information
The privacy and protection of your personal information is vitally important to us. We do not make personal information available to any third parties without your permission, except as provided herein. Any user statistics are provided in the aggregate only and do not include any personally identifiable information. Our corporate values, ethical standards, policies and practices are committed to the protection of visitor information. Unfortunately, no data transmission over the Internet can be guaranteed to be completely secure. Accordingly, despite our efforts to protect your personal information, we cannot ensure or warrant the security of any information you transmit to us. Once we receive your transmission, we make commercially reasonable efforts to ensure its security on our systems. Any type of data transmission made via email is done through SSL/TLS layer of security. SSL was developed by Netscape Communications Corporation in 1994 to secure transactions over the World Wide Web. Soon after, the Internet Engineering Task Force (IETF) began work to develop a standard protocol that provided the same functionality, which later became known as TLS. TLS and SSL are most widely recognized as the protocols that provide secure HTTP (HTTPS) for Internet transactions between Web browsers and Web servers. TLS/SSL enables server authentication, client authentication, data encryption, and data integrity over networks such as the World Wide Web.