eShopper 1.0 1.2.1-signed.1-signed
You always have the option to visit our site anonymously. However, should you choose to register on the site, subscribe to any mailings or feeds, or fill out any survey or form, we will collect relevant information which may include your name, your living address, your e-mail address, and/ or your cell phone number and cell phone provider.
HOW WE USE YOUR INFORMATION
The information we collect from our registered users may be used in one of the following ways:
· To improve our website and the website experience for our users;
· To personalize the user experience, which includes improving the customer service;
· In response to any contests, promotions, or surveys;
· To send out necessary email updates periodically.
eShopper is a plug-in that needs to be installed by the user in order to be used. The information collected by the plug-in, including how many times the plug-in has been downloaded, which browser it was downloaded from, and which websites you visit, are necessary in order return the correct promotions and coupons to you. This information will be kept anonymous. Should user registration be required in the future, the information will be used to send updates to the user specific to notifications about new versions of the plug-in to download or new features and enhancements to be aware of. By agreeing to install the plug-in, the user agrees to the privacy terms outlined in this paragraph.
THIRD PARTY SITES
When you opt-in to our mailing list (which may occur as you register on our site), you may receive emails related to company news, company or website updates, and/ or any related products or services. You always have the option to unsubscribe from receiving future emails.
RELEASE OF INFORMATION
Where required by law, eShopedia.com may disclose information about its users. This may include circumstances where we believe such disclosure is necessary to obtain subpoenas, court orders, or to support any other legal process.
The information collected from registered users is protected using a variety of security measures. Only authorized personnel with special access permissions, or any legal entity with appropriate credentials, may access sensitive information.