Internet user privacy and confidentiality is important to Growers Supply Co. To better protect your privacy we provide this notice explaining our practices and the choices you can make about the way your information is collected and used.
Information Collection and Use Growers Supply Co., are the sole owners of the information collected on this site. We will not sell, share, or rent this information to third parties in ways different from what is disclosed in this statement. Unless the user provides it voluntarily, Growers Supply Co. does not collect any personally identifiable information about visitors of the website. Some pages permit visitors to request additional information. Visitors are able to e-mail messages to Growers Supply Co. that will contain the user's name and e-mail address, as well as any additional information the user may wish to include in the message. Growers Supply Co. uses the information visitors provide about themselves to fulfill those visitors' requests. E-mail addresses are used to answer messages received only.
Log Files We use IP addresses and domain names to analyze trends and administer the site. IP addresses and domain names are not linked to personally identifiable information.
Links This website may contain links to other sites. Please be aware that Growers Supply Co. is not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every website that collects personally identifiable information. This privacy statement applies solely to information collected by this website.
Security Given the nature of the Internet and the fact that no security system is perfect, Growers Supply Co. cannot promise that the information you provide will never be obtained by unauthorized persons. Growers Supply Co. does, however, where applicable, utilize industry-standard practices to protect your personally identifiable information from loss, misuse, alteration and destruction. Such measures include using firewalls and security layers to protect certain sensitive transmissions of information.