Gymexo Store is very sensitive to your concerns regarding the security of your personal information and the security of your credit cards used to purchase products from gymexo.com. Safeguarding your privacy and confidentiality is of the utmost importance to us.
We use the latest encryption methods and provide physical security for our data servers. Read more about our security policies below.
Secure Socket Layers
Our Store uses SSL (Secure Sockets Layer) technology which is the industry standard and among the best software available today for secure commerce transactions. It encrypts all of your personal information including credit card number, name, and address to prevent it from being read as it travels over the Internet.
You can recognize when you are being protected by this technology by looking at the address bar on your web browser. The pages that transmit personal information will automatically change from http://www.gymexo.com to https://www.gymexo.com. The "https" indicates that this technology is working and that your information is being encrypted.
When you place orders or access account information we automatically send you to our secure server providing your browser accepts SSL encryption. Most commonly used browsers (versions 3.x or greater) developed by Microsoft and Netscape are able to process SSL encryption.
The only time a shopper is obligated to sign in is when making a purchase. We do store all information collected from your visits, including Personally Identifiable Information, but all in a secure environment using industry standard encryption and providing physical security for our data servers. Read more about how we protect your privacy.
When someone sends e-mails to in hopes of accessing your existing accounts or in hopes that they will be able acquire your personal financial information for fraudulent purposes they are engaging in email-fraud. This is commonly called a phishing or spoofing scam. These e-mails are usually crafted to look and feel like legitimate e-mail and may even look like they came from a source you trust. In fact, websites accessible by the links included in fraudulent e-mails often look very similar to the websites you are used to visiting.