[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.17.2″][et_pb_fullwidth_header title=”Legal” background_overlay_color=”rgba(0,0,0,0.39)” _builder_version=”3.17.2″ title_font=”||||||||” title_text_align=”left” title_text_color=”#ffffff” title_font_size=”72px” background_image=”https://blackstoneshoes.com/wp-content/uploads/2018/10/CBR3047-2.jpg” parallax=”on” custom_padding=”120px||120px||true”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.0.47″][et_pb_row admin_label=”row” _builder_version=”3.0.48″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]
What information do we collect?
We collect information from you when you place an order or subscribe to our newsletter.
When ordering or registering on our site, as appropriate, you may be asked to enter your: name, e-mail address, mailing address, phone number or credit card information. You may, however, visit our site anonymously.
What do we use your information for?
Any of the information we collect from you may be used in one of the following ways:
To process transactions Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
How do we protect your information?
We implement a variety of security measures to maintain the safety of your personal information when you place an order or enter, submit, or access your personal information.
We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway providers database only to be accessible by those authorized with special access rights to such systems, and are required to? keep the information confidential.