When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you use a contact form to contact us, we use the information to get back to you to answer your inquiry.
Cookies are for your convenience so that you do not have to fill in your cart and details again when you leave and come back. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you log out of your account, the login cookies will be removed.
Articles on this site may include embedded content (e.g. YouTube videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
We use Google analytics to determine how to serve you better. No personal information is ever collected.
We do not sell or share your personal data with anyone except what is necessary to complete your order (shipping company to deliver your order etc).
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments and filter any spam or bot comments.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
Visitor comments may be checked through an automated spam detection service.
We take extreme measures to protect your data like it's our own. All our computers, website and communication equipment are securely encrypted to protect your data. This includes technical measures such as encryption; security measures such as two factor authentication; and measures such as staff training in data protection and several vicious guard dogs.