This document describes the practices of Harvest Gold Gallery with respect to the collection of user information from this website and the use and disclosure of such information. This document only applies to this website and does not address information we obtain from places other than this website. In addition, other sites on the web (including those we link to) have their own practices; and in all cases we encourage you to ask questions and to provide data only to sites whose practices you understand and trust.
Collection of Information
We collect non-personally identifiable information about you in a number of ways, including tracking your activities through your IP address or most-recently-visited URL. However, we do not collect any personally identifiable information about you unless you voluntarily submit such information to us, such as by filling out a form or survey, entering a contest or sweepstakes, registering your e-mail address with us or e-mailing us.
Use of Information
We use personally identifiable and non-personally identifiable information for internal marketing purposes and for site administration. However, unless we tell you otherwise, we usually do not use personally identifiable information collected from the website to send unsolicited mailings to you. Of course, if applicable, we do use personally identifiable information to perform the services for which such data was collected (i.e., if you sign up for an e-mail newsletter, we will send the e-mail newsletter to the address you provide us).
Review and Removal of Your Personally Identifiable Data
If you provide us with personally identifiable information to have us perform ongoing services to you we will do our best to provide you with a way to review the information we have on file and either change or remove such data; however, to the extent that such information is also stored in other databases, we cannot always ensure that such corrections or deletions will reach the other databases.
Security
We use industry-standard methods to protect your personally identifiable information from unauthorized access. Such information is accessible only by designated staff or authorized agents. Third parties should not be able to access it during transmission. Among other techniques, we usually store such information on a computer behind our firewall in a secure location, and we often restrict the number of employees internally who can access such data. Of course, there is no such thing as “perfect security” on the Internet. Further, please note that our servers are run by a third party web host whose actions we do not control. In the unlikely event of a breach despite out efforts, we shall not be responsible for the interception. We do not sell, rent, or loan any personal information about our customers to any unauthorized party at any time.
Amendments
Amendments to this policy will be posted at this URL.