We do not sell your details to other companies.
We are fully committed to protecting & respecting your privacy. We only use the information that we collect about you in accordance with the Data Protection Act 1998.
We simply collect information about you to process your order smoothly and to give you the safest online shopping experience.
We will not use your information in any way that you have not authorised and will never disclose personal details to any third parties without your prior consent.
A detailed breakdown of the information is as follows:
A cookie is a small file that a Web server automatically sends to your PC when you browse certain Web sites. Cookies are stored as text files on your hard drive so servers can access them when you return to Web sites you've visited before. Cookies contain information that identifies each user, for example: Login/Username, Passwords, Shopping Cart & Information, Preferences, and so on. When a user revisits a Web site, his or her computer automatically "serves up" the cookie, which establishes the user's identity, thus eliminating the need for the customer to re-enter the information. Basically, the server needs to know this information in order for the Web site to work correctly, and the information is nothing more than a string of letters and numbers.
When a customer provides us with an e-mail address while placing a silver jewelleryorder, or when visitors send us e-mail correspondence, we retain the visitor´s e-mail address. We contact customers by their e-mail address to confirm an on-line order, to respond to an e-mail query and occasionaly to inform customers about our new products and promotions via a periodic newsletter.
If you place an order via telephone then we will only contact you regarding your order.
Your Security is Important
We use industry standard practices to safeguard the confidentiality of your personal identifiable information, including encryption, "firewalls" and Secure Socket Layers. Silver Nomad treats data as an asset that must be protected against loss and unauthorised access. We employ many different security techniques to protect such data from unauthorised access inside and outside the company.