Your privacy is important to us. When accessing our website, Fabric Inspirations LLC will learn certain information about you during your visit. How we handle information we learn about you depends upon what you do when visiting our site.
To place an order or to receive our Newsletter, you create an account and provide us with certain personally identifiable information including your name, mailing address, telephone contact number, email address and (optionally) fax number. This information is used in processing your orders and maintaining contact with you through our Newsletter. If you identify yourself by calling us or sending us an e-mail containing personal information, then the information collected will be solely used to respond to your message or purchase. We retain this information but we do not sell or give information collected about you to third parties. Your credit card number is required each time you make a purchase through our website or by telephone order. To protect your privacy, Fabric Inspirations LLC does not store credit card numbers. All online purchase transactions utilize secure processing technologies to help protect your privacy and security.
If you visit or make a purchase through our website, we may also collect and store the following information about you:
- The name of the domain from which you access the Internet
- The date and time you access our site
- The Internet address of the site you used to link to our site.
This information is collected for statistical analysis purposes only. Fabric Inspirations LLC and its web hosting company may use software programs to create summary statistics, which are used for such purposes as assessing the number of visitors to the different sections of our site, what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
For site security purposes and to ensure that this service remains available to all users, Fabric Inspirations LLC and its web hosting company may use software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.