Terms & Conditions
Isecuritystore Inc. is a provider of Third Party and own built iot Products, and Isecuritystore.us is it’s eCommerce website where Introduce/sell those Isecuritystore.us is a E-Commerce Portal in United States. We accept order from mail or from toll free number or from the web portal.
The Information submitted by you in Isecuritystore.us website or email is not shared anywhere unless you have shared it on your personal network. We are very concern about privacy of our clients and we never outsource your shared information. However, you may take in the note that the information shared with us may be accessed by the third party and if any such interruptions occur, Isecuritystore.us will not be liable in any manner.
Information on Our Website
We try to be use accurate information as much as possible. We will do efforts to make products accurate those displaying in the website. We do not warrant that product descriptions or other content is correct, complete, or error free. Prices and promotions are subject to change, and may vary from those offered in our website. We cannot assure the availability or price of an item until you place your order. Without considering our best efforts, sometimes an item in our website may not be available, the offer may have been misstated, or an item may be mispriced. For any of these reasons, we may cancel your order or we may contact you.
Payment for our products and the services you use your card at Isecuritystore.us , we may ask your credit card credentials along with other information on our web portal and we do not ask your personal information verbally or over the call or through email . www.isecuritystore.us, like many companies, may use the third-party payment gateways to process the credentials of cards provided by you.
Paying for Your Order
We will charge your payment for an item when we ship that item to you. However, we may preauthorize your order amount with your credit card, credit account, or debit card issuer at the time you place the order, which may have an effect on your available credit line. When you pre-order with a debit card, we’ll debit your card when you place the pre-order. For special delivery items, we’ll charge your payment method when you confirm a delivery time.
Our order confirmation does not indicate our acceptance of your order. At any time after confirmation of your order, we may accept or decline on your order for any reason. If we reject, limit, or otherwise modify your order, we will notify you using the email address or call you on your number which you provide to us. If we cancel an order or part of an order that we’ve already charged you for, we’ll refund you the full amount of the canceled portion of the order.
What We Collect
Information you give us
We collect and store information you provide through our website
The information we collect from you includes things like:
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
• By calling us and By emailing us.
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking ?
It’s also important to note that we allow third-party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Do we let third-parties, including ad networks or plug-ins collect PII from children under 13?
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
• Within 7 business days
•We will notify you via phone call
• Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
• Send information, respond to inquiries, and/or other requests or questions
• Process orders and to send information and updates pertaining to orders.
• Send you additional information related to your product.
To be in accordance with CANSPAM, we agree to the following:
• Not use false or misleading subjects or email addresses.
• Identify the message as an advertisement in some reasonable way.
• Include the physical address of our business or site headquarters.
• Monitor third-party email marketing services for compliance, if one is used.
• Honor opt-out/unsubscribe requests quickly.
• Allow users to unsubscribe by using the link at the bottom of each email.
You are completely responsible for your account and password and for restricting access to your. You should agree to make your account credentials confidential and not have to share with others.
All content cover all information, data, photographs, videos, typefaces is secured by copyright, trademark, patent or other proprietary rights, and these rights are valid and protected in all forms. You may not remove or modify any copyright, trademark or other proprietary notice contained in any Content you use, and you may not modify or alter the Content. You may not copy, modify, remove, delete, scrape, frame, add to, publish, participate in the transfer or sale, create derivative works from or in any way exploit any of the Content, in whole or in part.
You and isecuritystore.us each agree that any dispute or claim arising out of or relating in any way to these terms, or to any products sold by Isecuritystore.us , the advertising of or sales practices relating to such products, delivery, installation, and any communication, by whatever means, between you and Isecuritystore.us , will be resolved by binding, rather than in court. Disputes and claims that are within the scope of a small claims court’s authority are exempt from this dispute resolution provision, so long as they are brought individually.
Any warranty on any product sold by us is provided by manufacturer of that product. Isecuritystore.us will not be responsible for damage attributable to your use of any product purchased by www.isecuritystore.us . The limitations set forth in the section will not limit or exclude liability for personal injury or property damage caused by the product purchased from our website.
Links to Third-Party Websites
Isecuritystore.us contain links to other sites operated by third parties (“Third-Party Site(s)”). These links are available for your convenience and are intended only to enable access to these Third-Party Sites and for no other purpose.
Links to Other Websites
Social Media Features