Last Updated and effective as of: January 10, 2014
What We Collect
When you visit the Site, we may log and store your IP Address and technical information about your visit like your browser type and how you progressed through the Site, where you abandoned it, etc. (“Usage Information”).
If you choose to email or otherwise contact us, we record your contact information, which may include personal information like your name and email address.
How We Use It
Usage Data helps us monitor aggregate metrics such as total number of visitors, traffic, usage, and demographic patterns on our Site, diagnose or fix technology problems, and otherwise plan for, improve and enhance our Site or our business operations. We may associate information we automatically collect with your other information if you become a subscriber or trial user.
If you’ve submitted your email to us, we may use it to respond to your request or inquiry. We may also add it to our email list and inform you about future developments at AnnieCannons. You can always stop receiving email communications from us by replying to any email we send with the word “Unsubscribe” in the subject line.
We may share Usage Data with our third party service providers in the course of our operations, affiliates of our business, or in connection with the display of first or third party advertising specific to your geographic location. We may also engage third parties to help us improve our business, such as analytics providers, and such parties may have access to aggregate or individual Usage Data.
We care about the security of your information and use commercially reasonable physical, administrative, and technological safeguards to preserve the integrity and security of all information we collect and, in some cases, share with our service providers. Because of the nature of our Site, WE DO NOT CURRENTLY ENCRYPT ANY TRANSMISSIONS TO OR FROM THE WEBSITE IN ANY MANNER. IF YOU ARE UNCOMFORTABLE WITH THE UNENCRYPTED TRANSMISSION OF THE INFORMATION DESCRIBED HEREIN, PLEASE DO NOT SUBMIT INFORMATION TO US THROUGH THE SITE. While we take reasonable precautions against possible security breaches, no website or internet transmission is completely secure and we cannot guarantee that unauthorized access, hacking, data loss or other breach will never occur. In the event that any information under our control is compromised as a result of a breach of security, we will take reasonable steps to investigate the situation and where appropriate, notify those individuals whose information may have been compromised and take other steps, in accordance with any applicable laws and regulations.
Your activity on the Site does not allow us to recognize or acknowledge Do Not Track signals, though our registration process and services are secured according to specific contractual promises. Do not transmit any sensitive or personal information using the Site other than as directed to enter into a subscription or trial with us.
Third Party Links
The Site may, from time to time, contain links to and from third party websites of our partner networks, advertisers, partner merchants, retailers and affiliates. If you follow a link to any of these websites, please note that these websites have their own privacy policies and that we do not accept any responsibility or liability for their policies. Please check the individual policies before you submit any information to those websites.
Minors under 18 are not permitted to use our Site and we do not intentionally collect information from minors under 13. If you believe we have collected any personal information from a child younger than 13 years of age, please notify us immediately through the contact dialogue on our homepage and we will do anything reasonably possible to remove that information from our systems.
Contact Us and Accessing Your Information
If you have any questions about our privacy practices, or if you wish to remove any of your personal information from our records please submit your inquiry through the contact form on our website.
Note that we do not have identifying information on file for most users. We can only remove personal information actually in our possession.