What Information Do We Collect?
When you visit our Site or use one of our mobile applications, we may collect your IP address, and standard web log information, such as your browser type and the pages you accessed on our website (“Usage Information”). Usage Information may be stored or accessed using a variety of technologies that may be downloaded to your personal computer, laptop, tablet or mobile phone (a “Device”) whenever you visit or interact with our Service.
Personal and demographic information is collected when you purchase our products, create an account or use our Services. This certain information may come from data you provide directly, such as your name, email address, date of birth, or phone number, etc. (“Personal Information”), and such information as your gender, age, home address, income, etc. (“Demographic Information”), when you purchase a product or register an account with us, subscribe to any of our services or newsletters, respond to survey questions, requests or inquiries you make through our Site, and/or any other information you provide to us.
Elements of our Sites and Services may allow users to upload photos, media, bios, original content, and to share their experiences, such as reviews and comments. We cannot prevent others from recording or capturing any of your posted photos, videos, or information through various technologies used to capture website content. You should not post text, photos, and videos on our Sites or Services if you do not want others to see or possibly copy the media you post.
We may collect additional information from or about you in other ways not specifically described here. For example, we may collect information related to your contact with our customer support team or store results when you respond to a survey.
Do We Share Your Information?
We do not share your Personal Information with any unrelated third party except as expressly provided herein. Information is shared within our Sites and Services and any information or content that you voluntarily post using our Sites and Services will become available to the public. Please be mindful of your own privacy needs as you choose what to share and make public. We cannot control the privacy or security of information you choose to make public or share with others. We may share information with businesses that are legally part of PurWell. We may remove parts of information that identify you and share this anonymous data with other parties. We take reasonable measures to help protect your information from loss, unauthorized access, alteration, and misuse.
How Do We Use Your Information?
PurWell maintains a strict “no-spam” policy. If you register for an account on the Sites or Services, you may receive newsletters, notices and/or special offers via email or text message, unless you have requested otherwise at the time of registration.
We take commercially reasonable steps to safeguard your information and keep it confidential and free from any loss, misuse and unauthorized access, or disclosure. For example, when you enter sensitive Personal Information such as your credit card number via the Site, we encrypt that information using secure socket layer (SSL) technology.
However, no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to protect your personal information, we cannot guarantee its absolute security. To help protect yourself and your information, choose a unique password for our Sites and do not use a password on our Sites that you would use on any other website or online service. If you discover inaccuracies or alterations in your Personal Information or believe it to be at risk for any reason, we urge you to notify us immediately.
We will make any legally required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored “personal data” (as defined in applicable state statutes concerning security breach notifications) to you via email or conspicuous posting on the Site as promptly as possible, and without unreasonable delay, taking into account the legitimate needs of law enforcement or any measures necessary to determine the scope of the breach and/or to restore the reasonable integrity of the affected data system.
Third Party Advertisements