This privacy statement
discloses the privacy practices for Spy-Equipment-Hq.com
information and practices of Spy-Equipment-Hq.com to demonstrate
our commitment to your privacy, we have agreed to disclose our
information practices and notify you of:
identifiable information (or third party personally identifiable
information) of yours is collected from you through our website.
organization collecting the information.
information is used.
With whom the
information may be shared.
are available to you regarding collection, use and distribution of
The kind of
security procedures that are in place to protect the loss, misuse or
alteration of information under
How you can
correct any inaccuracies in the information.
Information Collection and
Spy-Equipment-Hq.com is the sole owner of the
information collected on this site. We will not sell, share, or rent
this information to others in ways different from what is disclosed in
We request information from the user on our
order form when making a purchase. Here, is where a user must provide
their contact information: name, shipping address, shipping
information, credit card number and expiration date, and e-mail
address. This information is used for billing purposes and to fill the
customer's order. If we have difficulty processing an order, this
contact information is used to get in touch with the customer.
Spy-Equipment-Hq.com gives you access to third
party partners to provide you with certain services that are detailed
below. Spy-Equipment-Hq.com will provide that third party with your
transaction information and then that third party will collect
additional information if needed to provide you with the requested
service. These third parties are not allowed to use personally
identifiable information except for the purpose of providing these
We use a credit card processing
company to bill users for our products. This company does not retain,
share, store or use personally identifiable information for any
This website contains links to other sites.
Please be aware that we are not responsible for the privacy practices
of such other sites. We encourage our users to be aware when they leave
our site and to read the privacy statements of each and every website
applies solely to information collected by Spy-Equipment-Hq.com.
Participation in our mailing list is completely
voluntary and the user therefore has a choice whether or not to
disclose this information. Information requested may include contact
information (such as name and email address). Your E-mail address will
be used to notify you of our specials.
Spy-Equipment-Hq.com takes every precaution to
protect our users' information. When users submit sensitive information
via our website, your information is protected both online and
When our registration/order form
asks users to enter sensitive information (such as credit card number),
that information is encrypted and is protected with the best encryption
software in the industry - Secure Socket Layers (SSLs). While on a
secure page, such as our order form, a lock icon appears on the bottom
of your Web browser. When you are not on a secure page, no lock icon
While we use SSL encryption to
protect sensitive information (like your credit card information)
online, we also do everything in our power to protect user information
off-line. All of our users' information, not just the sensitive
information mentioned above, is restricted in our offices. Only
employees who need the information to perform a specific job (for
example, our billing clerk or a customer service representative) are
granted access to personally identifiable information. Our employees
must use password-protected screen-savers when they leave their desk.
When they return, they must re-enter their password to re-gain access
to your information. Furthermore, ALL employees are fully informed
about our security and privacy practices and updated as new policies
are added or revised. They are regularly notified and/or reminded about
the importance we place on privacy, and what they can do to ensure that
our customers' information is protected. Finally, the servers that we
store personally identifiable information on are kept in a secure
environment under restricted access.