Profile We realize that privacy and security are at the core of our relationship with our customers. We are committed to maintaining the confidentiality of your private information and we use the latest security technology to protect your sensitive data.
IP Address The site uses visitors' IP addresses to help diagnose problems with its web server, and to administer the site. IP addresses are not linked to personally identifiable information. The site uses cookies to save registered users' user ID. and password, if they choose. The reason for this is so that registered users don't have to re-enter this information each time they visit the site. Visitors also have a choice of rejecting a served cookie. Rejecting a cookie does not prohibit visitors from accessing and using all the services provided through the site.
Forms The site's customization form requires users to submit contact information (such as their name and e-mail address). The contact information is used to contact the registered users when necessary (e.g., to confirm a shipment order). Registered users may always opt-out of receiving future mailings (see the choice/opt-out section below). The other optional information collected during registration is used to enhance the user's experience on the site and to provide a personalized "your Account" service. Other optional information collected includes courier preferences and frequently used ship from and ship to addresses. This information is collected to save users time by not making them re-enter the data each time they visit the site.
Security The site uses SSL (Secured Socket Layer) for communicating with visitors over the Web during critical phases, such as the displaying of personal or financial information or when generating a shipping label. The site also has security measures in place to protect against loss, misuse or alteration of the information under its control. All sensitive data, such as contact information or financial information requested from users, is collected over a secured channel and is stored on a highly secured system. Access to these systems is restricted to authorized users only, and is logged and monitored on a continuous basis. The physical access to these systems is also restricted.