By visiting DressHollywood.com, you are accepting the practices described in this Privacy Notice.
Your privacy is very important to us. Dress Hollywood will protect your privacy and not disclose your information to third parties. We want to make your experience on the Internet as enjoyable and rewarding as possible with complete confidence.
Personal Information Our Company Collects and How It Is Used
Introduction: Dress Hollywood may collect information in different ways from Visitors and Members who access the various parts of our Services and the network of Web sites accessible through our Service.
Registration: Members may be asked to provide certain personal information when they purchase our Products or Services including name, address, telephone number, and billing information (such as a credit card number). The personal information collected from Members during the registration process is used to manage each member account for billing purposes.
Online Shopping: During your online shopping, you may be asked to provide contact information, such as your name, address, email address, phone number, and credit card information.
Responses to Email Inquiries: When Visitors or Members send email inquiries to our company; the return email address is used to answer the email inquiry we receive.
Dress Hollywood has a commitment to Privacy for Children. Protecting the privacy of children is especially important to us. It is our policy to comply with the Children Online Privacy Protection Act of 1998 and all other applicable laws. Therefore we restrict our Web site to persons eighteen years or older.
YOU MUST BE EIGHTEEN (18) YEARS OR OLDER TO ACCESS THIS WEB SITE. IF YOU ARE UNDER EIGHTEEN YEARS OF AGE, YOU ARE NOT PERMITTED TO ACCESS THIS WEB SITE FOR ANY REASON. DUE TO THE AGE RESTRICTIONS FOR USE OF THIS WEB SITE, NO INFORMATION OBTAINED BY THIS WEB SITE, FALLS WITHIN THE CHILD ONLINE PRIVACY ACT (COPA) AND IS NOT MONITORED AS DOING SO.
Dress Hollywood Commitment to Data Security: Services and Web sites we sponsor have security measures in place to protect the loss, misuse, and alteration of the information under our control. While we make every effort to ensure the integrity and security of our network and systems.