Information Collection and Use
Our primary goals in collecting information from End-Users are to provide and improve the Service and the Parker's Crazy Cookies website, and to administer the Service and the Parker's Crazy Cookies website.
- If you are an End-User purchasing a product or service, we may collect at the check-out page certain Personal Information about you, including name, company's name, email address, telephone number, physical address, credit card details, and order ID. “Personal Information” means information that can be used to identify or contact a living individual.
- To process, validate and verify payments for purchases made through the Service.
- To verify accuracy of your information.
- To contact you about the Product or Service.
- If you use our contact us form located on our site we will collect your name and email address. We will use this information to respond to your inquiry.
Parker's Crazy Cookies is concerned with safeguarding your information. We process payments in connection with the Service in compliance with the PCI Security Standards and employ reasonable physical, technological, and administrative security measures and attempt to ensure they are applicable under the circumstances. No method of transmission over the Internet, or method of electronic storage, is 100% secure, however. Therefore, while we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security. When you enter sensitive information (such as credit card number on our order forms, we encrypt the transmission of that information using secure socket layer technology (SSL).
We will make any legally required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored “personal data” (as defined in applicable state statutes on security breach notification) to you via email or conspicuous posting via the Parker's Crazy Cookies website in the most expedient time possible and without unreasonable delay, insofar as consistent with (i) the legitimate needs of law enforcement or (ii) any measures necessary todetermine the scope of the breach and restore the reasonable integrity of the data system.