Trust is at the heart of every successful, ongoing relationship. At Keene Engineering, earning and keeping your trust is the standard for everything we do. Because of this commitment, we never sell, rent or trade e-mail addresses with any other company. And we have installed state-of-the-art security software to protect your personal financial information when you shop with us.
If you have any questions that are not answered below, please e-mail us at email@example.com.
|Do you sell or trade customer names and addresses?
We never sell, rent, or trade e-mail addresses. Period.
|What kind of information will I be asked for?
We will ask you to provide information when you place an order, request e-mail updates, request a catalog, or participate in a promotion, contest or survey. That information includes some or all of the following: your name, a company name, address, phone number, e-mail address and credit card information. If you ship your order to an address different from your billing address, we will ask you to enter the “ship to” name and address.
|How do I know Keene Engineering’s site is secure?
We use state-of-the-art technology to encrypt your financial information before it is sent. The ordering area of our site is protected this way and is referred to as “secure.” Secure transmission is not necessary for our product pictures or general site information and is not used there. This keeps our site faster and your shopping experience more enjoyable. You never have to worry about securely sending us your credit card information, we do that for you.
|You may have noticed the Thawte Authentic Site logo at the bottom our main pages. What this should mean to you is this:
Thawte SSL Server Certificates enables SSL on our web server, thereby giving us the ability to communicate securely with our online customers. SSL protects all communications.
|How can I tell if a web page is secured?
There are two general indications of a secured web page:
1) Check the web page URL
Normally, when browsing the web, the URLs (web page addresses) begin with the letters “http”. However, over a secure connection the address displayed should begin with “https” – note the “s” at the end.
2) Check for the “Lock” icon
There is a de facto standard among web browsers to display a “lock” icon somewhere in the window of the browser (NOT in the web page display area!) For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window:
As another example, Mozilla’s FireFox Web Browser displays the lock icon in the lower-left corner:
THE LOCK ICON IS NOT JUST A PICTURE! Click (or double-click) on it to see details of the site’s security. This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser! Therefore it is necessary to test the functionality built into this lock icon. Furthermore, it is very important to KNOW YOUR BROWSER! Check your browser’s help file or contact the makers of your browser software if you are unsure how to use this functionality.
If for any reason you cannot access a secure server to place your order, please feel free to call toll-free . Our customer service representatives will be more then happy to assist you.
|What if an unauthorized purchase does occur?
Keene Engineering will cover any liability imposed on you by your bank or credit card company, up to $50, in the unlikely event that your card is used without your authorization on our online store. We will also do whatever we can to help you resolve the situation. The Fair Credit Billing Act requires your bank or credit card company to hold you responsible for no more than $50 of unauthorized or fraudulent charges on a credit card. Most debit card issuers voluntarily adopt the same liability limitations as credit card issuers, but you may want to check with your bank to make sure. Remember: if unauthorized use of your credit or debit card does occur, it is your responsibility to notify your card provider as stated in your agreement with them.