What Information is Collected?
When you visit thetcase.com you may provide us with two types of information: personal information you knowingly choose to provide us with that is collected on an individual basis and secondly website use information collected as you and others browse thetcase.com. We will use the information that we collect on our site only to provide you with a faster and more efficient shopping experience. If you decide to purchase from thetcase.com, you will need to provide us with personal information and electronic authorization to process your credit card through our website. For example, you may need to provide the following information:
- Shipping Address
- Email Address
- Credit Card Number
- Name on Credit Card
- Expiration Date
- Credit Card Billing Address
- 3-Digit Security CCV Code
- Telephone Number
- Photo ID
None of this information will be ever be sold, shared, or traded to any other company.
If you choose to correspond with us via email, we will retain the content of your email message together with your email address and our responses. We provide the same protections for these electronic communications that we employ in the maintenance of information received by mail and telephone.
How do we Protect You and your Information?
All of the information you enter on thetcase.com is transmitted securely via a secure medium known as Secure Sockets Layer, or SSL. This secure layer provides up to 256 bit encryption for the most secure way of transmitting information on the internet. Financial information is never transmitted via email and is encrypted so that not even employees have access to your credit / debit / charge / e-check account number. Order information is stored in a password-protected area, only accessible by authorized personal. .
Privacy of Children
Children under the age of 21 are not allowed to use our web site and/or products. If you are under the age of 21, you can use this service only in conjunction with permission from your parents or legal guardians.
To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.