WHAT INFORMATION DO WE COLLECT FROM USERS?

We collect personal information, such as name, email address, and shipping address, as well as payment information, including credit card details or other payment method information. We also collect usage information, such as IP address, browser type, and device information. Additionally, we use cookies to enhance the browsing experience.

HOW DO WE COLLECTION USER INFORMATION?

We collect user information through various means, including information provided during the registration or checkout process, information obtained through cookies and similar technologies, and information collected automatically by our servers when users access or use our website

HOW DO WE USE THE COLLECTED INFORMATION?

We use the collected information to process and fulfill user orders, communicate with users regarding their orders, inquiries, or updates, personalize the user experience by providing relevant content and recommendations, improve our website, services, and offerings, and analyze user behavior and trends to enhance our marketing and advertising efforts.

DP WE SHARE USER INFORMATION WITH THIRD PARIES?

We may share user information with third parties in certain circumstances. This includes sharing shipping information with logistics partners to facilitate order fulfillment, processing payment transactions with authorized payment service providers, complying with legal obligations, responding to legal requests, or protecting our rights and safety. We may also share user information with their consent or as otherwise specified in this privacy policy.

HOW CAN USER EXERCISE THEIR RIGHTS OR MAKE INQUIRIES?

Users can exercise their rights or make inquiries by contacting us using the information provided in the "Contact Us" section of this privacy policy.

HOW DO WE PROTECT USER INFORMATION?

We take reasonable measures to ensure the security of user information. This includes implementing appropriate technical and organizational measures to safeguard data, regularly monitoring our systems for vulnerabilities and threats, restricting access to user information to authorized personnel only, and using secure connections for data transmission.