Our website security
V-Spec Performance will take all reasonable steps to keep secure any information that we hold about you. Personal information may be stored both electronically on our computer system, and in hard-copy form. Firewalls, 2048 Bit v3 SSL encryption, passwords, anti-virus software and email filters act to protect all our electronic information.
Additionally, we do not store credit card information on our website or our database.
We are committed to ensuring that your information is secure. In order to prevent unauthorized access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online.
A cookie is a small file that asks permission to be placed on your computer's hard drive. Once you agree, the file is added and the cookie helps analyze web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes, and dislikes by gathering and remembering information about your preferences.
We use traffic log cookies to identify which pages are being used. This helps us analyze data about webpage traffic and improve our website in order to tailor it to customer needs. We only use this information for statistical analysis purposes and then the data is removed from the system. Overall, cookies help us provide you with a better website by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us. You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. This may prevent you from taking full advantage of the website.
In the case of a data breach involving theft or exposure containing protected data, V-Spec Performance will begin the process of removing all access to the breached data followed by an investigation to determine the cause and source.