Big Time Products respects our customers’ privacy. This policy describes our privacy commitment.
How Information is Collected and Used
Big Time Products only collects personal information that you voluntarily submit at various contact pages within our web site. We only collect enough information to answer your question in accordance with the terms of this policy. This may include contact or confidentiality of the information during transmission.
Concerned users can configure their browser to prompt them if a cookie is requested. If they deny accepting the cookie they may not be able to access or use all the site functions that would otherwise be available.
Use and Retention of Personal Information
Examples of use of the information you have voluntarily given are marketing, informing you of promotions, responding to questions, complying with our legal obligations or staffing needs.
Sharing Your Personal Information with Others
Big Time Products will not share or sell your information with any person or entity other than one of its subsidiaries, affiliates and representatives unless we have your permission to do so or in accordance with the terms of this policy.
We will share information with third parties where we are compelled by law to do so.
Security of Your Personal Information
After Big Time Products has collected your personal information, we use both physical and electronic security methods to retain your information securely. We only allow authorized personnel to access information collected from our web site.
In connection with any application, request or enquiry you make, some information may be made available to Big Time Products affiliates some of which will be based on countries that do not have privacy laws.
Big Time Products advocates that people carefully consider what information they share and who they share it with. We recommend that everyone develop good security habits. These include protection and regularly changing your password, using computer virus protection, logging off when you finish using your computer, and consider the use of file or email encryption programs.