Privacy Policy
Privacy
Policy
Data Governance Framework
v. 2026.02
This Privacy Policy explains what information we collect, how we use it, how we share it, and the choices you have. We design our privacy practices to support secure shopping, reliable fulfillment, and responsive customer support.
Information
Acquisition
We collect information you provide directly, information generated through your interactions with the site, and information from third-party services used to operate the store (such as payment processors and delivery carriers).
Data
Utilization
We use information in ways that support safe checkout, reliable fulfillment, and accountable customer support. We limit use to what is relevant for operations, security, and customer experience.
- Order processing: confirm orders, process payments, prepare fulfillment, and send order updates.
- Shipping and delivery: coordinate with carriers, provide tracking, and resolve delivery exceptions.
- Customer support: respond to questions, troubleshoot issues, and handle returns/exchanges where applicable.
- Security: detect fraud, protect accounts, and reduce abuse and suspicious activity.
- Site operations: improve reliability, troubleshoot performance issues, and maintain service quality.
- Marketing (optional): provide product updates or promotions where you have subscribed or where permitted by law.
Information
Distribution
We share information with service providers that help us operate the store. We also share information when required by law, when needed to protect customers, and when necessary to enforce store policies.
Digital
Identifiers
Cookies and similar technologies help the site function, remember preferences, and provide analytics. You can manage cookie settings through your browser. Disabling some cookies may affect site features.
- Essential cookies: required for core site functions like checkout and security.
- Preference cookies: remember settings such as language or region where applicable.
- Analytics cookies: help us understand site performance and usage patterns.
- Advertising cookies: may be used to show relevant content where enabled.
- Session vs persistent: some cookies expire when you close your browser; others remain for a set period.
- Browser controls: most browsers allow you to block, delete, or limit cookies.
Request
Protocol
Depending on your location, you may have legal rights related to your personal information. We aim to honor valid requests within reasonable timeframes and in accordance with applicable law and operational requirements.
Protection
& Retention
We use reasonable administrative, technical, and organizational measures to protect information. No method of transmission or storage is fully secure, but we aim to reduce risk through access controls and operational safeguards.
Operational
Boundaries
Some requests may be limited by legal requirements, security safeguards, or operational constraints. We will explain if a request cannot be fulfilled in full and provide the reason where appropriate.
- Account verification: we may decline requests we cannot verify to prevent unauthorized access.
- Order records: transaction records may be retained for tax, accounting, and dispute resolution.
- Fraud prevention: certain security logs may be retained to protect customers and the store.
- Third-party systems: data stored by providers may follow their retention timelines as permitted.
- Children’s privacy: if you believe a minor has submitted personal data, contact us for review.
- International requests: rights may vary by location; we will handle requests under applicable law.