Privacy & Disclosure
Your Acceptance of this Privacy Statement Terms
Information We Collect
Drops Mobile Electronics, Inc. collects e-mail addresses, names and phone numbers in order to:
(i) properly respond to inquiries to our products and services;
(ii) better understand your comment or question;
(iii) respond to your inquiry within 1 day as stated on our contact pag
When you visit our web site, we automatically log your IP address (the unique address which identifies your computer on the internet) which is automatically recognized by our web server. We use IP addresses to help us administer our Web Sites and to collect broad demographic information for aggregate use. We do not link IP addresses to personally identifiable information.
We may automatically collect non-personal information about you such as the type of internet browsers you use or the site from which you linked to our web site. You cannot be identified from this information and it is only used to track end-user behavior.
With whom is the information shared?
Drops Mobile Electronics, Inc. will not and does not share, sell or rent your personal information to third parties. We will not disclose your personal information to third party suppliers who provide services on our behalf.
We may disclose aggregate statistics about our sales, our Web Site visitors and customers of our telephone services in order to describe our services to prospective partners, advertisers and other reputable third parties and for other lawful purposes, but these statistics will not include personally identifying information.We may disclose personal information if required to do so by law.
Our web site contains links to the sites of third parties. When you visit these sites, we suggest that you read their privacy policies. Drops Mobile Electronics, Inc. is not responsible for the privacy policies or the content of such sites.
Drops Mobile Electronics, Inc. places a great importance on the security of all information associated with our customers. We have security measures in place to attempt to protect against the loss, misuse and alteration of customer data under our control. For example, our security and privacy policies are periodically reviewed and enhanced as necessary and only authorized personnel have access to user information.