Butterflies and Bikinis Cares About Your Privacy


Our primary goal is to provide you with the most exciting and relevant products available today, in a safe and secure shopping environment. We do not collect consumer information at this site. The only information we collect about you online is information that you voluntarily provide to us to complete your order.

What Information We Collect


All information needed to complete your transaction, such as name, email address, phone number, credit card information and shipping address. We use this information as follows:

  • To keep you informed of your order and to better service you
  • To add you to our mailing list per your request, respond to a question or product inquiry you may have

Secured Payment Transactions

Butterflies and Bikinis is committed and certified to provide you a safe and secure shopping experience. ALL ONLINE CREDIT CARD TRANSACTIONS ARE PROTECTED by Verisign (SSL), encryption technology that ensures safe Internet transmission of your personal information.

Butterflies and Bikinisr has undergone investigation to meet very specific security guidelines to ensure all your Credit Card information is safe and secure.

Use of Cookies


Butterflies and Bikinis web site uses cookies, which are identification files that track your Web browsing activity only to aggregate information about the sites that users visit so that we can update and redesign, as necessary, our website to provide you with the most useful information. Personal information, such as your email address, is not collected, unless you provide it to us. Butterflies and Bikinis does not disclose any information to third parties other than vendors who assist us with our website and who are under strict confidentiality requirements.

Security Safeguards


Butterflies and Bikinis security is a priority. Butterflies and Bikinis employs appropriate measures, including advanced technology, to protect personal information collected online against unauthorized access, disclosure, alteration or destruction. These may include, among others, encryption, physical access security, computer firewalls and other appropriate technologies.