free shipping over $49.99

Our Security Policy

Your Personal Information

Feed The Machine will not sell, loan, rent, lease, barter or publish your personal information to a third party. All data that we keep on you is kept strictly for Feed The Machine business use to assist you in your current or future purchases or in analyzing sales trends. No customer data is stored on servers that are accessible to the Internet. All data is downloaded and deleted from our Web server many times a day.

Cookies and IP Numbers

Feed The Machine's privacy policy shows our firm commitment to customer privacy. We use your IP address to help diagnose problems with our server, and to administer our Web site. Your IP address is used to help identify you and your shopping cart and to gather broad demographic information. Our site uses cookies to keep track of your shopping cart.

We use cookies for other purposes such as site personalization. You can reject cookies and still use the Feed The Machine site, however, it will disable the ability for the site to recognize your cart, your account and any personalization efforts.

External Links

This site contains links to other sites. Feed The Machine is not responsible for the privacy practices or the content of such Web sites.

Address Information

Our site uses an order form for customers to request information, products and services. We collect visitor's contact information including but not limited to addresses, email addresses, phone numbers and financial information (account or credit card numbers). Information is gathered by Feed The Machine for the sole benefit of Feed The Machine. Contact information from the order form is used to send orders, information about our company, and promotional material from some of our partners to our customers. The customer's contact information is also used to get in touch with the customer when necessary. Users may opt-out of receiving future mailings.

Financial information that is collected is used to bill the user for products and services. Our online surveys ask visitors for contact information (typically the customer's email address) and demographic information (like their zip code, age, or income level). We use contact data from our surveys to send the user promotional material from Feed The Machine.

Customer information is considered to be an asset of Feed The Machine and as such may be transferred to another company as part of an acquisition of Feed The Machine.

Contests

We run contests on our site in which we ask visitors for contact information (typically the customer's email address) and demographic information (like their zip code, age, or income level).

We use contact data from our contests to send users promotional material from Feed The Machine and at times, some of our partners. When partners will receive the customer's information, it will be disclosed as such. The customer's contact information is also used to contact the visitor when necessary (i.e. When someone wins a contest.) Users may opt-out of receiving future mailings; see the choice/opt-out section below. Demographic and profile data is also collected at our site. We use this data to tailor our visitor's experience at our site, showing them content that we think they might be interested in, and displaying the content according to their preferences.

Secure Transactions

Can I safely transmit information such as credit card numbers? You can enter your credit card number on a secure (https) form and transmit the form over the Internet to a secure server without risk of an intermediary obtaining your credit card information. The security features offered by your web browser technology protects commercial transactions, as well as all other communications, from misappropriation and fraud that could otherwise occur as information passes through Internet computers.

With SSL implemented on both the client and server, your Internet communications are transmitted in encrypted form. Information you send can be trusted to arrive privately and unaltered to the server you specify (and no other).

SSL uses authentication and encryption technology. For example, your browsers export implementation of SSL (U.S. government approved) uses a High-grade, 128-bit key size. The encryption established between you and a server remains valid over multiple connections, yet the effort expended to defeat the encryption of one message cannot be leveraged to defeat the next message.

Your browser and secure servers deliver server authentication using signed digital certificates issued by trusted third parties known as certificate authorities. A digital certificate verifies the connection between a server's public key and the server's identification (just as a driver's license verifies the connection between your photograph and your personal identification. Cryptographic checks, using digital signatures, ensure that information within a certificate can be trusted.

You can tell when you have a secure connection by looking at the location (URL) field. If the URL begins with https:// (instead of http://), the document comes from a secure server. To connect to an HTTP server that provides security using the SSL protocol, insert the letter "s" so that the URL begins with https://. You need to use https:// for HTTP URLs with SSL and http:// for HTTP URLs without SSL..

You can also verify the security of a document by examining the security icon in the bottom-left corner of the browser window.

Only your computer and the server can encrypt and decrypt your information. In transit, the information is an unreadable jumble. An intermediary can continue to route the data, and even make copies of it, but the information cannot be decrypted and remains private and safely communicated.

eCommerce Development @Matrid

Loading...