Privacy Policy
Overview
This Policy describes how a standalone international e-commerce site manages personal information that consumers provide or that is collected automatically during browsing and purchasing. Our practices aim to be transparent, proportional, and secure, with controls that let you understand and manage how your information is used for order fulfillment, fraud protection, and site improvement.
Information We Collect
We collect account identifiers (display name, login handle), authentication data (hashed credentials, session tokens), contact data (billing and shipping addresses, optional phone number saved to an account), transactional data (items purchased, return history, gift options), device and usage information (IP address, device type, language, access times, referring URLs), and preference data (saved carts, wish lists, sizes). We also process limited payment metadata—such as tokenized references and card brand—to reconcile transactions and issue refunds. Sensitive authentication data like CVV is never stored and is handled exclusively by certified payment providers.
How We Collect It
Information is collected when you create an account, place an order, submit a review, participate in surveys, or use site features such as size guides and loyalty tools. We also use cookies and similar technologies to maintain sessions, store preferences, and generate aggregate statistics. Device risk signals and order pattern indicators are collected to help detect and prevent fraudulent activity.
Purposes of Processing
We use personal information to deliver products, verify identity, manage returns, protect our platform from misuse, perform analytics, test site features, optimize inventory planning, and personalize content such as recommended products. Data is processed under principles of necessity and proportionality: we do not use more information than required for a given function, and we align retention with the purpose for which data was collected.
Protection of Payment Card Numbers
At checkout, payment fields are presented through secure elements provided by certified payment processors. Card numbers are encrypted in transit and submitted directly to those processors, bypassing our servers. The processor returns a token and limited reference data (for example, the last four digits), which we retain to provide receipts, manage refunds, and display recognizable references in your account. We implement TLS with strong cipher suites, HSTS, network segmentation, and continuous monitoring for anomalies. Administrative access to payment configurations is protected by multi-factor authentication and audited logs.
Protection of Contact Information
Address and phone number fields are encrypted at rest and segregated within dedicated data stores. Role-based access controls restrict who can view or edit these fields. Every access is logged and monitored for irregular behavior. Data exports are masked where feasible, and temporary operational copies are automatically expired. We also apply strict data loss prevention rules to prevent unintended sharing of contact details in tickets, dashboards, or analytics datasets.
Cookie Use & Controls
Essential cookies enable login, cart preservation, checkout, and security verification. Functional cookies store preferences such as currency and localization. Analytics technologies measure page performance and help us improve navigation. You can manage non-essential cookies via browser settings and in-site controls where provided, though some features may be limited without certain cookies.
Personalization
We may personalize pages based on browsing history, purchase patterns, and inventory signals. To reduce the risk of identifying individuals within analytics, we use aggregated metrics and rotate identifiers. You can reset personalization by clearing your browsing data or by using account tools to remove saved history where available.
Sharing with Service Providers
We work with service providers that help us handle payments, verify orders, prevent fraud, store data, ship parcels, and analyze performance. These providers are obligated to protect personal information and may not use it for unrelated purposes. If we use measurement partners to evaluate campaign effectiveness, we apply hashing or tokenization and limit data to what is strictly required.
Global Processing & Transfers
Because we serve customers in multiple regions, data may be processed in locations outside your country. We use standard contractual clauses and technical safeguards such as encryption and access controls to protect data during transfers. Vendor agreements include confidentiality, breach notification, and deletion commitments aligned with our retention practices.
Security Program
Our security measures include secure development training, code scanning, dependency management, automated patching, infrastructure hardening, and routine penetration tests. We employ network firewalls, application-layer protections, and anomaly detection for suspicious behavior. Backups are encrypted and tested regularly to ensure recoverability.
Retention & Deletion
We retain personal information for as long as needed to provide services and meet legal obligations, then delete or de-identify it. Order records are kept for tax, warranty, and anti-fraud purposes. You can remove optional fields in your account and delete stored preferences where available. Logs are rotated and aggregated to reduce the volume of identifiable data over time.
Your Controls
Within your account, you can edit profile details, remove saved addresses, delete wish list items, manage cookie preferences, and clear browsing history where tools exist. You can also deactivate your account; after deactivation, we retain only the information necessary for compliance and fraud prevention, then securely archive or delete remaining data per schedule.
Children
Our services are intended for general audiences and not specifically for children. We do not knowingly collect personal information from users who are not legally able to consent under local laws. Accounts believed to be ineligible are subject to deletion using on-site controls.
Automated Decisions & Fraud Defense
Automated systems evaluate risk to prevent unauthorized transactions. The factors assessed may include device reputation, velocity of orders, mismatch signals, and historical chargeback indicators. We periodically evaluate these systems for effectiveness and fairness, and we calibrate thresholds to reduce the likelihood of incorrect declines.
Links & Embedded Tools
Our site may provide links or embedded components from other services, such as payment or tracking pages. Interactions with those services are governed by their own policies. We encourage reviewing their practices regarding information collection and use.
Policy Updates
We may revise this Policy to reflect operational or legal changes. Significant updates will be highlighted within the site so that you can review key modifications and continue to make informed choices about your data.
User Responsibilities
Please maintain strong passwords, keep your devices updated, and review your saved information periodically. Do not share one-time passcodes or links that grant access to your account. Use available security features to help protect your information.
