Because your privacy is important to us, TidySeed collects the minimum information required to conduct business. If you have additional questions, please contact us via email.
Information We Collect.
Our primary purpose in collecting personal information is to provide you with a safe, smooth, efficient, and customized shopping experience. This allows us to provide services and features that most likely meet your needs, and to customize our service to make your experience safer and easier. We only collect personal information about you that we consider necessary for achieving this purpose.
In general, you can browse the Site without telling us who you are or revealing any personal information about yourself.
If you choose to order our products we may require you to provide contact and identity information, billing information, shipping information and other personal information as indicated on the forms throughout the Site. Where possible, we indicate which fields are required and which fields are optional. You always have the option to not provide information by choosing not to use a particular service or feature. At this point you are no longer anonymous.
We use your financial information, including credit card information to verify the accuracy of your name, address, and other information, as well as to bill you for your purchase of our products.
We use data collection devices such as "cookies." One cookie is used by our shopping cart software so that you can go from place to place adding items to the cart. The items you add to the cart are saved inside the cookie. No personal information is stored in this cookie, only your cart selections for later checkout. Almost all shopping carts work this way.
Our cookies are "session cookies," meaning that they are automatically deleted from your hard drive at the end of a session. You are always free to decline our cookies if your browser permits, although in that case you may not be able to use certain features on the Site and you may be required to purchase each item individually through the cart, one item at a time.
Our Use of Your Information.
We use your personal information to process your purchases. We may also use it to process returns; resolve disputes; troubleshoot problems; help promote safe trading; collect moneys owed; customize your experience; detect and protect us against error, fraud and other criminal activity. You agree that we may use your personal information to contact you and deliver products that you have ordered and otherwise support your purchases.
Our Disclosure of Your Information.
As a matter of policy, we do not sell or rent any of your personal information to third parties for their marketing purposes. However, the following describes some of the ways that your personal information may be disclosed in the normal scope of business to provide our services.
Internal Service Providers for Our Operations. We may use third party affiliates that we refer to as internal service providers to facilitate or outsource one or more aspects of our business, this includes web site hosting, security and shopping cart services.
Legal Requests. TidySeed cooperates with law enforcement inquiries, as well as other third parties to enforce laws, such as: intellectual property rights, fraud and other rights, to help protect you and the Internet community from bad actors. Therefore, in response to a verified request by law enforcement or other government officials relating to a criminal investigation or alleged illegal activity, we can (and you authorize us to) disclose your name, city, state, telephone number, email address, fraud complaints, and purchase selection information without a subpoena.
Your information is stored temporarily on TidySeed's servers located in the United States. We use procedural and technical safeguards to protect your personal information against loss or theft as well as unauthorized access and disclosure to protect your privacy, including encryption, "firewalls" and Secure Socket Layers.
We treat data as an asset that must be protected against loss and unauthorized access. We employ many different security techniques to protect such data from unauthorized access by users inside and outside the company. However, "perfect security" does not exist on the Internet.