Your account is password protected so that unauthorized third parties do not have access to your personal information. We recommend that you do not give your password out to anyone. We will never ask you for your password in an unsolicited phone call or in an unsolicited e-mail. Remember to log out of your account by clicking the Logout button or close your browser window when you have finished your work. This ensures that others cannot access your account or personal information if you share a computer with someone else or are using a computer in a public place.
We use the industry standard encryption, Transport Layer Security (TLS) - the successor to the Secure Sockets Layer (SSL). TLS is composed of two layers and its record protocol provides connection security with some encryption method such as Data Encryption Standard (DES). While we currently do not accept payment information, should we enter payment processing, we will store all password and payment information in an encrypted format.
Unfortunately, no data transmission over the Internet can be guaranteed to be 100% secure. As a result, while we strive to protect your personal information, we cannot ensure or warrant the security of any information you transmit to us or from our online products or services, and you do so at your own risk. In the event of a breach, by signing up for Suits + Tables, you agree to be contacted by via email, unless explicitly requested otherwise by contacting the Company.
At this time we do not have any partners, but we retain the right to establish those relationships in the future. As such, we currently do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, to the best of our ability, we will de-identify visitor information before provided to other parties for marketing, advertising, or other uses.
Trusted third parties may include banks or certification authorities, used in the electronic transfer of secure data. The third parties generally use cryptography and other security measures to authenticate the identity of the sender, the security of the data during transmission, and to verify delivery to the intended recipient.