What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, mailing address, phone number, credit card information or other details to help you with your experience.
When do we collect information?
We collect information from you when you register on our site, place an order, subscribe to a newsletter or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
• To administer a contest, promotion, survey or other site feature.
• To quickly process your transactions.
How do we protect your information?
We do not use vulnerability scanning and/or scanning to PCI standards.
An external PCI compliant payment gateway handles all CC transactions.
We use regular Malware Scanning.
We do not use an SSL certificate
• We only provide articles and information. We never ask for personal or private information like names, email addresses, or credit card numbers.
Do we use 'cookies'?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser's Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, Some of the features that make your site experience more efficient may not function properly.that make your site experience more efficient and may not function properly.
Do we disclose the information we collect to Third-Parties?
We sell,trade, or otherwise transfer to outside parties your name, address,city,town, phone number Personally Identifiable Information.
Occasionally, at our discretion, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.
Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users.
We have not enabled Google AdSense on our site but we may do so in the future.
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States' consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Do we let third-parties, including ad networks or plug-ins collect PII from children under 13?
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
• Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
• Process orders and to send information and updates pertaining to orders.
• Send you additional information related to your product and/or service
To be in accordance with CANSPAM, we agree to the following:
If at any time you would like to unsubscribe from receiving future emails, you can email us at
and we will promptly remove you from ALL correspondence.
1870 Parkcrest Dr
Costa Mesa, CA 92627
Last Edited on 2017-12-28
How We Protect Information about our Customers
Industry-standard SSL (Secure Sockets Layer) encryption is always used to protect your purchase information while in transit.
Stored credit card number is always encrypted and maintained in an environment that has been certified as PCI DSS compliant by a qualified security assessor.
Our websites are constantly scanned and validated to verify application and network security.
All internal security standards, policies and practices are reviewed and improved based on the current industry security practices.
Information Security Tips for Protecting Yourself
Never share your user ID or password. Remember, anybody who holds your account login information can access your account and make a purchase.
Create a secure password. The more secure your password is, the harder it is to guess. While it‘s not required, we suggest that you choose a password that is at least 7 characters and includes a mix of letters, numbers and special symbols.
Avoid using easily identifiable or personal information as your password, such as a word from a dictionary, family or pet’s name, or email address.
Be cautious about using a public computer, as it may contain keylogger software designed to steal your login credentials. If you do decide to use a public computer to shop on the our websites, do not forget to sign out from the website when you have finished using the public computer.
Emails are generally insecure and easy to forge. Be aware that an email, even if it appears to come from a friend or a business partner, could be fraudulent and designed to trick you into providing personal information or installing dangerous software on your device.
Install antivirus and firewall software on your computer to help protect yourself from phishing scams and viruses.
We will never initiate the request for your account password or any other sensitive account information, such as your credit card.
If you contact LVBImports Customer Support, we may verify your identity by asking for information, such as your account user name, shipping address or past order information.
On the Phone
When you call our Customer Support, we may verify your identity by asking for information such as your current shipping address, order information or the last four digits or expiration date of the credit card we have on file for your account.
When logging in or checking out on our websites, all sensitive data is transmitted over HTTPS. This means a secure SSL connection has been established, and that all data transmitted through this connection will be encrypted. If you are receiving SSL Certificate errors when accessing to our websites, that means that the domain name in the SSL certificate does not match the address that is in the address bar of the browser. Alternatively, it may mean that your browser is misconfigured and does not accept the root certificate used by LVBimorts.
If you suspect that any account information has been compromised or fraudulent charges have been made on your LVBImports account, please contact Customer Support immediately for assistance by contacting us through the website.
Updates to this Information Security Policy
This Information Security Policy may be updated periodically and without prior notice to you to reflect changes in our information security practices. We will post a prominent notice on our websites to notify you of any significant changes to our Information Security Policy and indicate at the bottom of the policy when it was most recently updated.