Texas Hookah Lounge collects client information to make your online shopping experience the very best. We respect your privacy, and we assure you that this information will never be used without your consent.
Texas Hookah Lounge gathers navigational information about where you go on our website and information about the technical efficiencies of our website and services. This information allows us to see which areas of TexasHookahLounge.com are most visited and helps us better understand our clients’ experience at TexasHookahLounge.com. This helps us improve the quality of clients' online shopping experiences by recognizing and delivering more of the features, services and products our clients prefer. Additional non-personal identifiable information may be collected which will provide information regarding your use of our website.
COLLECTION, USE, AND DISCLOSURE OF INFORMATION:
We collect information from you that you provide to us on our website when you establish or update an account, enter a contest, shop online, purchase and send an e-gift certificate, or request information. This information is used to enable TexasHookah.com to deliver products or requests that you have ordered or created, to contact you, or the recipient in the event of order or delivery difficulties, to respond to your inquiries and to deliver services and information about our products or website to you, including adding you to our mailing list.
You should be aware that we may disclose specific information about you if necessary to do so by law or based on our good faith belief that it is necessary to conform or comply with the law or is necessary to protect the users of our website, the site, or the public.
We will disclose any information needed by USA or State governmental agencies as required by law
OUTSIDE LINKS ON WEBSITE:
For your convenience, our website may contain links to other sites. Texas Hookah Lounge is not responsible for the content or privacy practices of such websites.
QUESTIONS/CHANGES IN POLICY:
Texas Hookah Lounge takes the following types of security measures: use of technologies and policies including limited access data-centers, firewall technology, secure certificate authentication and limitations of administrative access to our systems.
Any Questions? Email us at: email@example.com