(vikingrss) and its affiliated companies (collectively, the “Company”) respect your privacy rights and recognize the importance of protecting the Personal Information (as defined below) provided by you to us. This Privacy Policy describes how the Company collects, stores, and uses the Personal Information you provide to us through the Company’s web sites and through telephone or e-mail communications you may have with us. This Privacy Policy also describes the choices available to you regarding the Company’s use of the Personal Information you provide to us, and the actions you can take to access this information and request that the Company correct or delete it.

1. Consent

By using the Company’s websites, you acknowledge that you have read this Privacy Policy and you consent to the practices described herein with respect to the Company’s collection, use and disclosure of the Personal Information you have provided to us. This is the Company's entire and exclusive Privacy Policy and it supersedes any earlier version. We reserve the right to change this Privacy Policy in accordance with the terms herein at any time, which is why we encourage you to visit this page often, review this Privacy Policy frequently, and remain informed about any changes to it.

If, after review, you still have questions about any portion of this Privacy Policy, please contact the Company using the contact information provided at the bottom of this Privacy Policy.

2. Information Collection and Use

A. Personal Information “Personal Information” means information that can identify you as a specific individual, such as your name, address, phone number, e-mail address, or other contact information, whether at work or at home.

On all Company web sites that collect Personal Information, we specifically describe what information is required in order to provide you with the product, service, or feature you have requested.

We collect Personal Information when you contact us, when you register with us, when you use our products and services, when you submit an order with us, when you visit our web sites or the web sites of certain of the Company’s partners, and when you enter promotions and sweepstakes.

3. Registration

When you register with us on this site, you must first complete the on-line registration form, which requires you to create a username and password. During registration, you are also required to provide Personal Information, which may include name, billing address, shipping address, telephone number, e-mail address, credit card number, and credit card expiration date. We use this information so that we may contact you about the services and products on the site(s) in which you have expressed interest or requested and to facilitate the completion of an order.

4. Promotions, Contests and Sweepstakes

From time-to-time, the Company may provide you the opportunity to participate in promotions, contests or sweepstakes on its web site(s). Such promotions, contests and sweepstakes will also be governed by the rules and regulations posted with such promotions, contests and sweepstakes. If you participate, you will be required to register with the Company, which will require you to provide certain Personal Information. Participation in these promotions, contests and sweepstakes is completely voluntary and you therefore have a choice whether or not to register and provide your Personal Information. The requested information typically includes contact information, such as name, shipping address, e-mail address, and telephone number. We will use this information to notify winners and award prizes. Additionally, during best replica watches your registration process you may opt-in to receiving additional related communications from us. If you decide to opt-in, we will use the information provided to send you communications described throughout this Privacy Policy.

5. Newsletters

If you wish to subscribe to the Company’s newsletter(s), we will use your name and e-mail address to send the newsletters to you.

6. Other Information Collected

Some information may be collected automatically every time you visit the Company’s web sites, such as cookies and computer information. In addition, information may be collected from other independent, third-party sources. We also collect information about which pages you visit within this site. This site visitation data is identified only by a unique URL.

7.Cookies

The Company uses both session ID cookies and persistent cookies as part of its interaction with your browser. A cookie is an alphanumeric identifier (a file) that the Company’s web sites transfer to your computer’s hard drive through a web browser to enable its systems to recognize your browser for record-keeping purposes. A session ID cookie expires when you close your browser, while a persistent cookie remains on your hard drive for an extended period of time. We use session ID cookies to make it easier for you to navigate our web sites. We use persistent 

8.Fraud Screening Process

The Company employs a robust fraud screening process to ensure the safety and integrity of our services. Our screening is facilitated by industry-standard tools and vendors specializing in fraud detection and prevention. This screening works as:

Tools and Vendors: We utilize state-of-the-art fraud detection software and collaborate with trusted third-party vendors known for their expertise in fraud prevention. These vendors have established methodologies for identifying and flagging potentially fraudulent activities.

Functions and Composition: The fraud screening process involves a combination of automated algorithms and manual checks by our expert analysts. It encompasses various aspects, including but not limited to:

1). Order Verification: We cross-reference order details, such as payment information, product selection, and transaction history, to detect any anomalies or irregularities.

2). Identity Verification: Our screening may involve identity verification processes to ensure that customers are who they claim to be.

3). Behavioral Analysis: We analyze user behavior and patterns to identify suspicious activities or deviations from typical user interactions.

Rules and Algorithms: Specific rules and algorithms are programmed into the fraud screening system. These rules are designed to identify patterns associated with fraudulent transactions. They can range from simple checks like verifying email addresses to complex algorithms that detect anomalies in transaction data.

Parties Subject to Screening: All orders and transactions on our platform are subject to fraud screening. This includes both buyers and sellers to maintain a secure environment for all users. Additionally, certain high-risk transactions or accounts may undergo enhanced screening procedures.

Continuous Monitoring: Our fraud screening is an ongoing process. It includes real-time monitoring of activities to swiftly identify and respond to potential threats.