What information do we collect? How do we use it?If you choose to become a registered user on our website, and/or if you choose to purchase products from us, then you will need to provide us with some personal and company information, as well as an authorization to obtain references from various vendors and credit services. For example, we request details about your business, banking information, phone numbers, email addresses, addresses, titles, etc. Moreover, we may retain the contents and responses to any written or verbal communications.
In general, personal information is used solely for administering our business activities and providing customer service to our customers, and prospective customers. Orders submitted online are considered authorized and no further confirmations are required. All orders submitted are subject to review and approval by Avandium Trading Ltd.
For full details on the cookies used on our website, please see our cookie page.
Protecting User IDs and passwordsIt is solely the user’s responsibility to maintain and protect your user ID and password, as these can provide full access to your purchase history, credit history, payment history, as well as whatever personal information you may have submitted. We have no liability towards users for stolen or misappropriated user IDs or passwords. All user IDs and passwords are to remain private and cannot be shared with 3rd parties. Sharing of such information may lead to revoking your online access.
Note that we do not manage user passwords as they are encrypted. Should a user forget his/her password, they would need to reset it themselves using the forgot password feature.
How do we transmit and protect your information?Security maintenance is essential for Avandium Trading Ltd., which is why we implemented a variety of security measures to maintain the safety of your personal and business information. Our website is protected by multiple layers of security to prevent unauthorized access.
Our website platform was analyzed using various automated and manual techniques, including analysis of OS Command Injection, SQL Injection, Untrusted Initialization, CRLF Injection, Cross-Site Scripting, Cryptographic Issues, Directory Traversal, Insufficient Input Validation, Code Quality, and Information Leakage.
All credit card information is encrypted when orders are processed. We do not keep the credit card numbers in our servers. We use secure servers protected by the strongest firewalls currently available on the market. Physical access to these servers is limited and controlled.