Goldstein Swank & Gordon ("GSG") Jewelers respects the privacy of individuals visiting our website, and accordingly we have adopted policies to protect on-line privacy. GSG may change or revise these policies at any time at our discretion. The changes or revisions will be reflected on the website at this location. If you have any questions or comments regarding these policies, please contact us.
There may be links on the GSG website that take you to websites or web pages outside of our website. The privacy and security policies and practices of these websites are beyond our control and we advise our users to take appropriate measures to protect themselves when entering and browsing other websites.
To serve as your jewelry destination, GSG asks you to provide us with your personal information. We use this information to help you identify the merchandise that best fit your interests and preferences. “Personal information” is information such as your name, address, phone number, email address and date of birth.
GSG does not sell, trade or give away your personal information to third parties. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. GSG may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety.
If you choose to sign up for our periodic emails – or make a purchase – we will store that information, but not release it to any other party or company without your permission.
GSG uses industry-leading technologies to ensure the security and confidentiality of the personal information you provide us. Any time you enter or provide personal information on our website, we encrypt it using Secure Socket Layer (“SSL”) technology. SSL protects information as it crosses the Internet. Your credit card information is securely processed by a trusted credit card processor that uses the highest possible level of data security system.