CUPCAKE SECURITY AND PRIVACY POLICIES or DON'T WORRY ABOUT IT, YOUR SHIT IS SAFE

PRIVACY AND SECURITY

Cupcake's Privacy and Security Policies

PRIVACY
What information do we collect?
We collect information from you when you place an order.
When ordering or registering on our site, as appropriate, you may be asked to enter your: name, e-mail address, mailing address, phone number or credit card information. You may, however, visit our site anonymously.

Your information is never shared with retailers. In fact, it's securely protected by data encryption (via our payment gateway) technology, reducing the risk of online fraud and identity theft.
What do we use your information for?
Any of the information we collect from you may be used in one of the following ways:
To personalize your experience (your information helps us to better respond to your individual needs).

To improve our website (we continually strive to improve our website offerings based on the information and feedback we receive from you).

To improve customer service (your information helps us to more effectively respond to your customer service requests and support needs).

To process transactions Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.

To send periodic emails.

Personal gain. We get crazy rich from selling your info to 1-976 numbers. (kidding) (maybe)

The email address you provide for order processing, will only be used to send you information and updates pertaining to your order.

If you decide to opt-in to our mailing list, you will receive emails that may include company news, updates, related product or service information, etc.

Note: If at any time you would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email.

How do we protect your information?
We implement a variety of security measures to maintain the safety of your personal information when you place an order. We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway providers database only to be accessible by those authorized with special access rights to such systems, and are required to keep the information confidential. After a transaction, your private information (credit cards, social security numbers, financials, etc.) will not be stored on our servers.

Do we use cookies?
Yes (Cookies are small files that a site or its service provider transfers to your computers hard drive through your Web browser (if you allow) that enables the sites or service providers systems to recognize your browser and capture and remember certain information. We use cookies to help us remember and process the items in your shopping cart.

If you prefer, you can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies via your browser settings. Like most websites, if you turn your cookies off, some of our services may not function properly. However, you can still place orders by contacting customer service.

Do we disclose any information to outside parties?
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

Third party links
Occasionally, at our discretion, we may include or offer third party products or services on our website. These third party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.

California Online Privacy Protection Act Compliance
Because we value your privacy we have taken the necessary precautions to be in compliance with the California Online Privacy Protection Act. We therefore will not distribute your personal information to outside parties without your consent.

Children's Online Privacy Protection Act Compliance
We are in compliance with the requirements of COPPA (Children's Online Privacy Protection Act), we do not collect any information from anyone under 13 years of age. Our website, products and services are all directed to people who are at least 13 years old or older.

Your Consent
By using our site, you consent to our privacy policy.

Changes to our Privacy Policy
If we decide to change our privacy policy, we will post those changes on this page.

Contacting Us
If there are any questions regarding this privacy policy you may contact us using the information below. (please don't)

Cupcake
3338 University Ave. SE.
Minneapolis, MN 55414
Phone: (612) 378-4818
Fax: (612) 378-4704

SECURITY
SSL Security
Our SSL certificates support both industry-standard 128-bit (used by all banking infrastructures to safeguard sensitive data) and high-grade 256-bit SSL encryption to secure online transactions.

The actual encryption strength on a secure connection using a digital certificate is determined by the level of encryption supported by the user’s browser and the server that the Web site resides on.

For example, the combination of a Firefox® browser and an Apache 2.X Web server enables up to 256-bit AES encryption with our certificates.

Encryption strength is measured in key length—number of bits in the key. To decipher an SSL communication, one needs to generate the correct decoding key. Mathematically speaking, 2n possible values exist for an n-bit key. Thus, 40-bit encryption involves 2 40 possible values. 128- and 256-bit keys involve a staggering 2 128 and 2 256 possible combinations, respectively, rendering the encrypted data de facto impervious to intrusion.

Even with a brute-force attack (the process of systematically trying all possible combinations until the right one is found) cracking a 128- or 256-bit encryption is computationally unfeasible.