Our Tru-Pos Store has been designed to securely transmit all of the personal information you enter to place your order via SSL or SHTTP. Check your browser documentation to see how it displays a secure transaction. If you see that secure status indication, you can be assured that your vital information is securely encrypted over the Internet.
Commitment to Privacy
This privacy notice covers all the online information practices of Kremer Precision.
We are concerned about your privacy and the security of your personal data. We have made a strong effort to ensure that your personal information is safeguarded. This notice explains our online information practices and the choices you can make about how your information is collected and used. It discloses the privacy guidelines for our websites.
Use of Information
Name, address, phone number and credit card information are used to ship and bill orders. In addition, phone number and order numbers are used in case there is a problem with your order and customer service needs to contact you.
We also gather data on visitor's movements through our sites. This information is used to improve our service to you and to administer our websites. Our server recognizes the home server (IP) and actions (such as page hits) of visitors. Data on visitors' home servers is aggregated for internal review. The aggregate information on what pages are visited is used to improve the site content and also for error tracking purposes related to the functioning of the site. Therefore, individually identifiable e-mail addresses are not captured or stored for future use, unless you provide them by posting a message to our website.
We do not share your personal information with subsidiaries and affiliates.
Third Party Policy
Third Party Marketing is defined as a company that has no direct relationship with our customers. Third parties will not contact you as a result of your purchases made through our store.
Commitment to Data Security
We committed to the security of information collected on our sites. To prevent unauthorized access, maintain data accuracy and ensure the correct use of information, we have put in place appropriate physical, electronic and managerial procedures to safeguard and secure the information we collect online.
Private account information is located behind a firewall; it is not directly connected to the Internet. Information behind the firewall on the customer server is not available to unauthorized computers. The firewall is a recognized industry standard.
Encryption is a process by which we use software to scramble sensitive information while it is in transit to us. It is based on a key that has two different parts: public and private.
The public part of the key is distributed to those you want to communicate with. The private part is for recipients' use only. When you send personal information to us, you use our public key to encrypt your personal information. That means if your information is intercepted during the transmission, it is scrambled and very difficult to decrypt. Once we receive your encrypted personal information, we use the private part of our key to decode it.