We know security is a concern to you, and our approach will help give you a greater peace of mind. A security policy is what it means to be secure for a system, organization or other entity. For an organization like ours, it addresses the constraints on behavior of its regular ethical visitors, as well as constraints imposed on adversaries like hackers and Internet thieves. For systems, our security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.
Because Custom Pillow Source's security policy is a high level definition of secure consistent behavior, it is meaningless to claim an entity is "secure" without knowing what "secure" means. The bottom line is simple - what is shared with our company, stays in our company through multiple secure levels.
Virus Prevention Policy
The willful introduction of computer viruses or disruptive/destructive programs into Custom Pillow Source's environment is prohibited, and violators may be subject to prosecution. All desktop systems that connect to Custom Pillow Source network must be protected with an approved, licensed anti-virus software product that it is kept updated according to the vendor's recommendations. All servers and workstations that connect to the network and that are vulnerable to virus or worm attack must be protected with an approved, licensed anti-virus software product that it is kept updated according to the vendor's recommendations. Headers of all incoming data including electronic mail must be scanned for viruses by the email server where such products exist and are financially feasible to implement. Outgoing electronic mail should be scanned where such capabilities exist. Where feasible, system or network administrators should inform users when a virus has been detected. Virus scanning logs must be maintained whenever email is centrally scanned for viruses.
Intrusion Detection Policy
Intruder detection must be implemented on all servers and workstations containing data classified as high risk. Operating system and application software logging processes must be enabled on all host and server systems. Where possible, alarm and alert functions, as well as logging and monitoring systems must be enabled. Server, firewall, and critical system logs should be reviewed frequently. Where possible, automated review should be enabled and alerts should be transmitted to the administrator when a serious security intrusion is detected. Intrusion tools should be installed where appropriate and checked on a regular basis.
Internet Security Policy
All connections to the Internet must go through a properly secured connection point to ensure Custom Pillow Source's network is protected when the data is classified high risk. All connections to the Internet should go through a properly secured connection point to ensure the network is protected when the data is classified confidential.
System Security Policy
All systems connected to the Internet should have a supported version of the operating system installed. All systems connected to the Internet must be current with security patches. System integrity checks of host and server systems housing high risk Custom Pillow Source data should be performed.
Acceptable Use Policy
Custom Pillow Source must have a policy on appropriate and acceptable use that includes these requirements: Custom Pillow Source computer resources must be used in a manner that complies with OCG, Inc. policies and State and Federal laws and regulations. It is against Custom Pillow Source policy to install or run software requiring a license on any Custom Pillow Source computer without a valid license. Use of the Custom Pillow Source's computing and networking infrastructure by Custom Pillow Source employees unrelated to their positions must be limited in both time and resources and must not interfere in any way with Custom Pillow Source functions or the employee's duties. Use of Custom Pillow Source resources for personal profit is not permitted except as addressed under other OCG, Inc. policies. Decryption of external or internal passwords is not permitted, except by authorized staff performing security reviews or investigations. Use of network sniffers shall be restricted to system administrators who must use such tools to solve network problems. Auditors or security officers in the performance of their duties may also use them. They must not be used to monitor or track any individual's network activity except under special authorization as defined by campus policy that protects the privacy of information in electronic form.
Custom Pillow Source uses technologies of third-party partners such as Google Ads, Bing Ads, and NextRoll to help us recognize your device and understand how you use our site so that we can improve our services to reflect your interests and serve you advertisements about the products that are likely to be of more interest to you. Specifically, NextRoll, Google Ads, and Bing Ads collect information about your activity on our site to enable us to:
- Measure and analyze traffic and browsing activity on our site;
- Show advertisements for our products to you on third-party site;
- Measure and analyze the performance of our advertising campaigns;
We may share data, such as hashed email derived from emails or other online identifiers collected on our site with NextRoll and our other advertising partners. This allows our partners to recognize and deliver you ads across devices and browsers. To read more about the technologies used by Custom Pillow Source and their cross device capabilities please refer to NextRoll's Privacy Notice.Opting-Out
Our advertising partners may use non-cookie technologies that may not be impacted by browser settings that block cookies. Your browser may not permit you to block such technologies. For this reason you can use the following third party tools to decline the collection and use of information for the purpose of serving you interest based advertising:
Consent To Our Communication With You By E-Mail
By establishing a registered account with us, and/or each time you make a purchase through our site, you grant permission for Custom Pillow Source to contact you at your e-mail address. To stop receiving our monthly newsletters, promotional/marketing, or special announcement e-mails follow the opt-out procedures set forth at the bottom of each email sent to you by our company.
Choices for Personal Information
When you sign up as a registered user on Custom Pillow Source that requires registration, we ask you to provide personal information. If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use.
Most browsers are initially set up to accept cookies, but you can reset your browser to refuse all cookies or to indicate when a cookie is being sent. However, some Custom Pillow Source features, products, and services may not function properly if your cookies are disabled. You can decline to submit personal information to any of our services, in which case Custom Pillow Source may not be able to provide those services to you.
Custom Pillow Source only shares personal information with other companies or individuals outside of Custom Pillow Source in the following limited circumstances:
- We have your prior written consent – electronically via email or registration. We require opt-in consent for the sharing of any sensitive personal information.
- We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Custom Pillow Source, its users or the public as required or permitted by law.
Please contact us at the address below for any additional questions about the management or use of personal data.
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to Custom Pillow Source employees, suppliers, manufacturers, and agents who need to know that information in order to fulfill your order or to develop or improve our services. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
Accessing and updating personal information When you use Custom Pillow Source website, we make good faith efforts to provide you with access to your personal information and either to correct this data if it is inaccurate or to delete such data at your request if it is not otherwise required to be retained by law or for legitimate business purposes. We ask our online customers to identify themselves and the information requested to be accessed, corrected or removed before processing orders.
3521 Wetumpka Hwy
Montgomery, AL 36110-2717
When we receive formal written complaints at this address, it is Custom Pillow Source’s policy to contact the complaining user regarding his or her concerns. We will cooperate with the appropriate regulatory authorities, including local data protection authorities, to resolve any complaints regarding the transfer of personal data that cannot be resolved between Custom Pillow Source and an individual.
3521 Wetumpka Hwy
Montgomery, AL 36110-2717