The types of personally identifiable information collected from you via the website, how it is utilized, and with whom it may be shared.
Your available choices concerning the utilization of your data.
The security measures implemented to safeguard against the misuse of your information.
Instructions on how to correct any inaccuracies in the information.
Information Collection, Use, and Sharing
We are the sole proprietors of the data collected on this platform. We only obtain information that you willingly provide to us, such as via email or direct contact. We pledge not to sell or lease this information to any third party.
We will employ your information to respond to your inquiries or requests. Your information will not be disclosed to any external parties, except as required to meet your specific requests, for example, to fulfill custom orders.
Your Access to and Control Over Information
You have the ability to opt out of receiving future communications from us at any time. You can take the following actions whenever you desire by reaching out to us using the email address or phone number provided on our website: • Review any data we possess about you, if any. • Modify/correct any data we possess about you. • Request the removal of any data we possess about you. • Voice any concerns you may have regarding our use of your data.
We employ precautionary measures to safeguard your information. When you transmit sensitive data through our website, it is protected both online and offline. Any sensitive information, such as credit card details, is encrypted and securely transmitted to us. You can verify this by locating a closed lock icon at the bottom of your web browser or observing "https" at the beginning of the web page's address when you input payment information.
In addition to online protection, we also ensure the security of your information offline. Access to personally identifiable information is restricted to employees who require it to carry out specific duties, such as billing or customer service. The servers and computers where we store this information are maintained in a secure environment.