Privacy and security

This Web site, www.cranberryfarm.ca is owned and operated by Terra Beata Farms Ltd. We are strongly committed to protecting the privacy of our Web site users. The intent of our privacy policy is to inform you, the user, about the information that we may collect about visitors to our site, how we use that information, and about our disclosure practices.

Terra Beata Farms Ltd. is committed to high standards that require honesty, integrity and fairness. Terra Beata Farms Ltd. will collect no personal information about you unless you choose to provide that information to us. We do not use techniques that collect personal information about you without your knowledge.

What happens to your personal information?

All personal information that is collected on our Web site is stored in a secure location. At no time will Terra Beata Farms Ltd. solicit personal information to third party vendors without prior consent, as we respect the privacy and confidentiality of our Web site visitors.

What about spam?

Subscribers will not receive any unsolicited emails or correspondence if they have not provided Terra Beata Farms Ltd. with prior permission. From time to time we may use email as a way to keep in touch with our Web site visitors; however, we do not send “spam” (unsolicited marketing e-mail).

When you leave this site

This policy discloses the privacy practices for our Web site. However, our site contains links to other sites. Once you link to another site, you are subject to the privacy and security policies of the new site. We encourage you to read the privacy policies of all Web sites you visit, especially if you share any personal information

Security Policy

Users are prohibited from violating or attempting to violate the security of the site. By way of example, you are prohibited from (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security without proper authorization; (c) attempting to interfere with service to any user, host or network; (d) sending unsolicited mail, including promotions and/or advertising of products or services.