1. Personal Information We Collect
Information You Provide: We may receive and store information you enter. For example, when you search for a product or service, or when you supply information such as your address, phone number, e-mail address, etc. We may use the information that you provide for such purposes as responding to your requests, improving our website, and communicating with you. We will not sell or rent our customer lists or other personally identifiable information to others, e.g. marketing firms or other companies.
Other Information: Every computer has an IP (Internet Protocol) address. IP addresses of computers used to visit this site may be noted. In addition, we may collect other information such as email addresses, browser types, operating systems, and the URL addresses of sites clicked to and from this site.
Information from Other Sources: We might receive information about you from other sources and add it to our account information.
2. Use of Your Information
Agents: We may employ other companies and individuals to perform functions on our behalf. They may have access to personal information needed to perform their functions, but may not use it for other purposes.
Business Transfers. As we continue to develop our business, we may sell or buy assets. In such transactions, customer information generally is one of the transferred business assets. Also, in the event that we are acquired, customer information will be one of the transferred assets.
Law Enforcement: If we receive a lawful court order to release account or other personal information, then we will comply with the law. We may also release information when necessary to protect the life, safety or property of others.
3. We Protect the Security of Your Information
We work to protect the security of your information during transmission and your information contained in our customer list.
We use a firewall to protect against unlawful intrusion.
We limit access to your information on a “need to know” basis.
It is important for you to protect against unauthorized access to your password and to your computer. Be sure to sign off when finished using a shared computer.
No system can guarantee absolute security, just as the finest lock can not guarantee physical security. However, we take every reasonable precaution to assure that your data is secure.
4. Other Websites
5. Contact Us