This Security Strategy sets out how we gather, use, and safeguard the individual data of guests to our internet business site.

Data Gathered

We might gather the accompanying data from guests to our site:

Name, email address, phone number, and other contact data
Transportation and charging address
Installment data, for example, charge card number and lapse date
Buy history and other exchange subtleties
IP address and other specialized data about the gadget used to get to our site
Data intentionally gave through reviews, advancements, or different structures

Utilization of Data

We utilize the data gathered to:

Process requests and installments
Convey items and administrations
Speak with clients about orders, advancements, and different issues
Work on our items and administrations
Safeguard against false movement and other security issues
Conform to legitimate commitments

Sharing of Data

We don’t offer or lease individual data to outsiders. In any case, we might impart data to:

Specialist co-ops who help us with request satisfaction, installment handling, and different capabilities
Colleagues who offer corresponding items or administrations
Policing different specialists when legally necessary or to safeguard our freedoms

Security of Data

We go to sensible lengths to shield individual data from unapproved access, exposure, change, or annihilation. In any case, no security framework is 100 percent powerful, and we can’t ensure the security of data sent through our site.

Treats and Different Advancements

We use treats and different advancements to upgrade the client experience and track site utilization. Treats are little text records that are put away on the client’s gadget and permit us to perceive returning guests and customize content. Clients have some control over treat settings through their program inclinations.

Connections to Outsider Locales

Our site might contain connections to outsider locales, which have their own security arrangements. We are not answerable for the security practices or content of these destinations.

Updates to Protection Strategy

We might refresh this Protection Strategy now and again, and any progressions will be pondered our site. Clients are urged to occasionally survey the strategy.

Contact Data

In the event that you have any different kinds of feedback about this Protection Strategy, if it’s not too much trouble, get in touch with us

Shopping cart

0
image/svg+xml

No products in the cart.

Continue Shopping