Arrow Fat Left Icon Arrow Fat Right Icon Arrow Right Icon Cart Icon Close Circle Icon Expand Arrows Icon Facebook Icon Instagram Icon Hamburger Icon Information Icon Down Arrow Icon Mail Icon Mini Cart Icon Person Icon Ruler Icon Search Icon Shirt Icon Triangle Icon Bag Icon Play Video


Thank you for visiting Anje Designs Web site and reviewing our privacy andsecurity statement. Anje Designs is strongly committed to maintaining theprivacy of your personal information and the security of our computer systems.With respect to the collection, use and disclosure of personal information, AnjeDesigns makes every effort to ensure compliance with applicable Federal law.

As a general rule, does not collect personally-identifyinginformation about you when you visit our site, unless you choose to provide suchinformation to us. The information we receive depends upon what you do whenvisiting our site.

If you respond to an on-line request for personal information:

Generally, the information requested by the Company will be used to respondto your inquiry or to provide you with the service associated with the request.However, when this information is requested, the reasons for collecting it witha description of the Company's intended use of the information will be fullydescribed in a customized "Privacy Notice." This Privacy Notice will eitherappear on the Web page collecting the information or be accessible through alink prominently displayed immediately preceding the information request.

If you visit our site to read or download information, we collect and storethe following information:

The name of the domain from which you access the Internet (for example,, if you are connecting from anje designs's  computer account).
The date and time you access our site.
The Internet address of the Website from which you linked directly to our site.
The above information isused by software programs on our Web site to create summary statistics whichallow us to assess the number of visitors to the different sections of our site,identify what information is of most and least interest, determine technicaldesign specifications, monitor system performance, and help us make our sitemore useful to visitors.

If you identify yourself by sending an e-mail containing personalinformation:

You also may decide to send us personally-identifying information, forexample your mailing address, in an electronic mail message requesting thatinformation be mailed to you. Information collected in this manner is usedsolely for responding to requests for information or records. We may forwardyour e-mail to other Company employees who are better able to respond to you.

Cookie Use Notice employs "cookies" to provide better service to its customers.The Company does not use cookies to collect any personally identifyinginformation from users or to track user activities beyond our Web site. TheCompany does not maintain copies of cookies on our Web site after you leave ourWeb site.

Cookies are small pieces of temporary data that are exchanged between a Website and a user's computer which enable a "session," or "dialog," to beestablished between the two machines. With the session established, the Companyis able to tailor its responses (i.e., identify and provide you with theinformation you want) and help you traverse our Web pages in the most efficientand effective manner possible. The session is often broken when the Company'sserver does not receive further requests from your computer or you simply exityour browser.

The Company limits its use of cookies to "session cookies" — types of cookiesthat are temporarily stored in your computer's memory. Session cookies arenormally deleted from a user's computer when the user logs off the computer orthe user exits the browser.


For security purposes and to ensure that this service remains available toall users, our Web site also employs software programs to monitor networktraffic to identify unauthorized attempts to upload or change information, orotherwise cause damage.

Unauthorized attempts to upload information or change information on thisservice are strictly prohibited and may be punishable under the Computer Fraudand Abuse Act of 1986 and The National Information Infrastructure Protection Actof 1996.