Fashion Biz Online Privacy Policy INTRODUCTION Fashion Biz respects the privacy of our users. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit any of our websites/webstores, including all digital asset platforms, media channels or mobile applications. Please read this privacy policy carefully. If you do not agree with the terms of this privacy policy, please do not access the site. We reserve the right to make changes to this Privacy Policy at any time and for any reason. Any changes or modifications will be effective immediately upon posting the updated Privacy Policy on the Site, and you waive the right to receive specific notice of each such change or modification. You are encouraged to periodically review this Privacy Policy to stay informed of updates. You will be deemed to have been made aware of, will be subject to, and will be deemed to have accepted the changes in any revised Privacy Policy by your continued use of our digital systems after the date such revised Privacy Policy is posted. COLLECTION OF INFORMATION / DATA LOGS We may collect specific information about your interactions with our digital systems in the form of systems logs as a means to ensure our systems are performing as expected and to make us aware of any potential issues with our software or services. We collect a minimum amount of data, and data that we do collect is used solely for the purpose of improving our systems and the services that we provide. In order to give you the best possible experience using our digital services, we collect information from your interactions with our network, some of which you actively provide to us, such as your email address, which we use to allow you to access and use your account with us, and to communicate transaction data back to you. Other information we collect is based on actions you take while using your account, such as what pages you access and your interactions with our system features. This information may include, but is not limited to, logs of your interactions, your IP address, information about your device (such as device or browser type), and logs of any abnormal activity within our system code which could potentially lead to errors. No code is perfect, and every online business will experience errors and system crashes from time to time. Log data can be crucial in correcting such problems whenever they occur, and can be an indispensable tool in determining where and how the problems arose, allowing an agile response from our technical team.
Updated October 2021
TRACKING TECHNOLOGIES Cookies and Web Beacons We may use cookies, web beacons, tracking pixels, and other tracking technologies on our digital platforms to help improve our systems and consequently your online experience with our systems. Your personal information is not collected through the use of tracking technology. Most browsers are set to accept cookies by default. You can remove or reject cookies, but be aware that such action could affect the availability and functionality of your interactions with our systems. You may not decline web beacons - however, they can be rendered ineffective by declining all cookies or by modifying your web browser’s settings to notify you each time a cookie is tendered, permitting you to accept or decline cookies on an individual basis. Website Analytics We may also partner with selected third-party vendors to allow tracking technologies and analytics services on our platforms through the use of first party cookies and third-party cookies, to, among other things, analyze and track users’ use of our applications, determine the popularity of certain content, and better understand online activity. We do not transfer personal information to these third-party vendors. SECURITY OF YOUR INFORMATION We use administrative, technical, and physical security measures to help protect your personal information. While we have taken reasonable steps to secure the personal information you provide to us, please be aware that despite our efforts, no security measures are perfect or impenetrable, and no method of data transmission can be guaranteed against any interception or other type of misuse. Any information disclosed online is vulnerable to interception and misuse by unauthorized parties. Any data/logs that we collect are stored safely and never shared with other parties. When no longer required for technical purposes, all data is securely disposed of.
Updated October 2021