PCI COMPLIANCE TERMS AND CONDITIONS


NEW CANCELLATION POLICY, EFFECTIVE 9-7-22!

A credit card is required for online booking.
DOLCE HAIR SALON will send out appointment confirmation text and/or email 48h prior to your service.
As a courtesy, if you have not confirmed your appointment online, we will call and confirm your service appointments up to one day prior to your appointment date. However, if we are unable to reach you, and can only leave a message, please understand that it is your responsibility to remember your appointment dates and times to avoid late arrivals and missed appointments.
UNDERSTAND THAT THERE IS A 24 HOUR CANCELLATION POLICY. FAILING TO GIVE PROPER NOTICE TO CANCEL, YOU WILL BE CHARGED A FEE OF 100% OF YOUR TOTAL SCHEDULED SERVICE PLUS 20% GRATUITY.
Should you need to cancel your appointment, please do so via TEXT ONLY at this number (859) 543-0707 minimum 24h before your appointment.

The DOLCE TEAM!

CANCELLATION & PRICING POLICY

Your investment starts at the prices shown. Pricing may vary upon stylist request.  For those clients blessed with long or lots of hair, you may be more expensive but your are worth it!

Your appointments are very important to the Artistic Design Team members of Dolce Hair Salon. They are reserved especially for you. We understand that sometimes schedule adjustments are necessary; therefore, we respectfully request at least 24 hours notice for cancellations.

Please understand that when you forget or cancel your appointment without giving enough notice, we miss the opportunity to fill that appointment time, and clients on our waiting list miss the opportunity to receive services. Our appointments are confirmed 48 hours in advance because we know how easy it is to forget an appointment you booked months ago.

The cancellation policy allows us the time to inform our standby guests of any availability, as well as keeping our Dolce Hair Salon team members schedules filled, thus better serving everyone. Dolce Hair Salon’s policies are presented and provided in the best quality and tradition of excellence, servicing our established and future clientele. Thank you for viewing and supporting our policies criteria.


CONFIRMATION CALLS

As a courtesy, if you have not confirmed your appointment online, we will call and confirm your service appointments two business day prior to your appointment date. However, if we are unable to reach you, and can only leave a message, please understand that it is your responsibility to remember your appointment dates and times to avoid late arrivals and missed appointments.


RETURN & EXCHANGE POLICY

If you are dissatisfied with any product, we will gladly exchange it or issue a store credit for the return. A 25% restocking fee will apply to all items purchased. We will not accept products that are more than 15% used, damaged or exceed 30 days past the original purchase date.
All sales are final on special order items, requests and gift certificates. No cash or credit refunds.

Covid-19 color kits and online consultation services are non refundable.

If you're not satisfied with our service, please let us know and we will gladly arrange a complimentary redo of your service within one week of your initial service. Alternatively, upon inspection of your hair within one week after the original service done by a Dolce Hair Salon employee, you may be eligible for a refund up to 40% of the cost of service. However, this policy does not apply if: 1) You had hair services from anyone other than Dolce's employees between the time of your service and when it is inspected; or 2) If you changed your mind about the services received after consulting with staff and completing the services.


Privacy And Security Policy

Thank you for visiting dolcehairsalon.com. Ensuring the privacy and security of your personal information is very important to us. Our privacy and security policy outlines the information we collect about you, how and why we use the information and the choices you have to restrict our usage of this information.

COLLECTED INFORMATION
Personal information you provide to us while signing up for mailing lists and at checkout (ie: name, address, telephone number, email address, billing address and credit card information) is maintained in private files on our secure web server and on our internal systems.

Dolce Hair Salon does not sell your personal information or share it with any third party. Dolce Hair Salon may disclose specific personal information about you if required by law, governmental request, court order if based on our good faith belief, it is necessary to conform or comply with such law, request or court.

OUR EMAIL LIST
We offer those who sign-up for our email list advanced notice of new merchandise and other Dolce Hair Salon news. Email addresses collected at dolcehairsalon.com are only used internally. We respect your privacy rights and will not sell or rent your email address to other companies. If you would like to be removed from our email list, please follow the instructions sent along with each email or contact us at you@dolcehairsalon.com or by calling the salon at (859) 543-0707. We will remove your name from our email list as soon as possible. Please recognize that you may receive another email before we are able to remove you.

SECURE ONLINE APPOINTMENT SCHEDULING
Appointments scheduled on our site require a credit card to hold the appointment time for you. Our website is encrypted using SSL technology*, so rest assured that your transactions are protected. With SSL implemented on both the client and server, information sent via the Internet can be trusted to arrive privately and unaltered to our server. In order for SSL security to work, you must use an SSL enabled browser. Most browsers, version 3.x and later, support SSL. If you still have any concerns about scheduling electronically, feel free to call (859) 543-0707 and schedule your appointment over the phone.

*Secure Socket Layer (SSL) is a technology used by vendors to ensure the security of online business. It negotiates and employs the essential functions of mutual authentication, data encryption and data integrity for secure transactions.
**Please note that email is not encrypted and is not considered a secure means of transmitting credit card numbers and that we will NEVER ask for sensitive information via email.

Please contact us with any questions about our privacy & security policy


  

 Information Security Policy  

 

 Giuliani LLC DBA Dolce Hair Salon

___________________________________________ 

 

(Company Name) 

      

 

 

 

 

 

 

 

 

 

___9-7-22________________ 

 

(Date) 

      

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  

Contents

Introduction 3

Information Security Policy 3

1. Network Security 4

2. Acceptable Use Policy 4

3. Protect Stored Data 4

4. Information Classification 5

5. Access to the Sensitive Cardholder Data 5

6. Physical Security 6

7. Protect Data in Transit 6

8. Disposal of Stored Data 7

9. Security Awareness and Procedures 7

10. Credit Card (PCI) Security Incident Response Plan 8

11. Transfer of Sensitive Information Policy 12

12. User Access Management 12

13. Access Control Policy 13

Appendix A – Agreement to Comply Form – Agreement to Comply With Information Security Policies 15

Appendix B – List of Devices 16

Introduction 

This Policy document encompasses all aspects of security surrounding confidential company information and must be distributed to all company employees. All company employees must read this document in its entirety and sign the form confirming they have read and fully understand this policy. This document will be reviewed and updated by Management on an annual basis or when relevant to include newly developed security standards into the policy and re-distributed to all employees and contractors where applicable.

Information Security Policy

The Company handles sensitive cardholder information daily.  Sensitive Information must have adequate safeguards in place to protect the cardholder data, cardholder privacy, and to ensure compliance with various regulations, along with guarding the future of the organisation.

The Company commits to respecting the privacy of all its customers and to protecting any customer data from outside parties.  To this end management are committed to maintaining a secure environment in which to process cardholder information so that we can meet these promises.

Employees handling sensitive cardholder data should ensure:

• Handle Company and cardholder information in a manner that fits with their sensitivity and classification;

• Limit personal use of the Company information and telecommunication systems and ensure it doesn’t interfere with your job performance;

• The Company reserves the right to monitor, access, review, audit, copy, store, or delete any electronic communications, equipment, systems and network traffic for any purpose;

• Do not use e-mail, internet and other Company resources to engage in any action that is offensive, threatening, discriminatory, defamatory, slanderous, pornographic, obscene, harassing or illegal;

• Do not disclose personnel information unless authorised;

• Protect sensitive cardholder information;

• Keep passwords and accounts secure;

• Request approval from management prior to establishing any new software or hardware, third party connections, etc.; 

• Do not install unauthorised software or hardware, including modems and wireless access unless you have explicit management approval;

• Always leave desks clear of sensitive cardholder data and lock computer screens when unattended;

• Information security incidents must be reported, without delay, to the individual responsible for incident response locally – Please find out who this is.

We each have a responsibility for ensuring our company’s systems and data are protected from unauthorised access and improper use.  If you are unclear about any of the policies detailed herein you should seek advice and guidance from your line manager.

• Network Security

A high-level network diagram of the network is maintained and reviewed on a yearly basis.  The network diagram provides a high level overview of the cardholder data environment (CDE), which at a minimum shows the connections in and out of the CDE.  Critical system components within the CDE, such as POS devices, databases, web servers, etc., and any other necessary payment components, as applicable should also be illustrated. 

 

In addition, ASV should be performed and completed by a PCI SSC Approved Scanning Vendor, where applicable.  Evidence of these scans should be maintained for a period of 18 months.

• Acceptable Use Policy

Management’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to the Company’s established culture of openness, trust and integrity. Management is committed to protecting the employees, partners and the Company from illegal or damaging actions, either knowingly or unknowingly by individuals. The Company will maintain an approved list of technologies and devices and personnel with access to such devices as detailed in Appendix B.

• Employees are responsible for exercising good judgment regarding the reasonableness of personal use.

• Employees should take all necessary steps to prevent unauthorized access to confidential data which includes card holder data. 

• Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. 

• All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature. 

• All POS and PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered.

• The List of Devices in Appendix B will be regularly updated when devices are modified, added or decommissioned.  A stocktake of devices will be regularly performed and devices inspected to identify any potential tampering or substitution of devices.  

• Users should be trained in the ability to identify any suspicious behaviour where any tampering or substitution may be performed.  Any suspicious behaviour will be reported accordingly.

• Information contained on portable computers is especially vulnerable, special care should be exercised. 

• Postings by employees from a Company email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of the Company, unless posting is in the course of business duties. 

• Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code. 

• Protect Stored Data  

• All sensitive cardholder data stored and handled by the Company and its employees must be securely protected against unauthorised use at all times. Any sensitive card data that is no longer required by the Company for business reasons must be discarded in a secure and irrecoverable manner.

• If there is no specific need to see the full PAN (Permanent Account Number), it has to be masked when displayed.

• PAN'S which are not protected as stated above should not be sent to the outside network via end user messaging technologies like chats, ICQ messenger etc.,

It is strictly prohibited to store: 

• The contents of the payment card magnetic stripe (track data) on any media whatsoever.  

• The CVV/CVC (the 3 or 4 digit number on the signature panel on the reverse of the payment card) on any media whatsoever.  

• The PIN or the encrypted PIN Block under any circumstance.

• Information Classification

Data and media containing data must always be labelled to indicate sensitivity level.

• Confidential data might include information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure, or data that would cause severe damage to the Company if disclosed or modified.  Confidential data includes cardholder data.

• Internal Use data might include information that the data owner feels should be protected to prevent unauthorized disclosure. 

• Public data is information that may be freely disseminated.

• Access to the Sensitive Cardholder Data

All Access to sensitive cardholder should be controlled and authorised. Any job functions that require access to cardholder data should be clearly defined.

• Any display of the card holder should be restricted at a minimum to the first 6 and the last 4 digits of the cardholder data.

• Access to sensitive cardholder information such as PAN’s, personal information and business data is restricted to employees that have a legitimate need to view such information. 

• No other employees should have access to this confidential data unless they have a genuine business need. 

• If cardholder data is shared with a Service Provider (3rd party) then a list of such Service Providers will be maintained as detailed in Appendix C.

• The Company will ensure a written agreement that includes an acknowledgement is in place that the Service Provider will be responsible for the for the cardholder data that the Service Provider possess.

• The Company will ensure that a there is an established process, including proper due diligence is in place, before engaging with a Service provider.

• The Company will have a process in place to monitor the PCI DSS compliance status of the Service provider.

• Physical Security  

Access to sensitive information in both hard and soft media format must be physically restricted to prevent unauthorised individuals from obtaining sensitive data. 

 

• Media is defined as any printed or handwritten paper, received faxes, floppy disks, back-up tapes, computer hard drive, etc.  

• Media containing sensitive cardholder information must be handled and distributed in a secure manner by trusted individuals.  

• Visitors must always be escorted by a trusted employee when in areas that hold sensitive cardholder information. 

• Procedures must be in place to help all personnel easily distinguish between employees and visitors, especially in areas where cardholder data is accessible. “Employee” refers to full-time and part-time employees, temporary employees and personnel, and consultants who are “resident” on Company sites. A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to physically enter the premises for a short duration, usually not more than one day.

• A list of devices that accept payment card data should be maintained.

• The list should include make, model and location of the device.

• The list should have the serial number or a unique identifier of the device

• The list should be updated when devices are added, removed or relocated

• POS devices surfaces are periodically inspected to detect tampering or substitution. 

• Personnel using the devices should be trained and aware of handling the POS devices

• Personnel using the devices should verify the identity of and=y third party personnel claiming to repair or run maintenance tasks on the devices, install new devices or replace devices.

• Personnel using the devices should be trained to report suspicious behaviour and indications of tampering of the devices to the appropriate personnel. The Company sites. A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to enter the premises for a short duration, usually not more than one day.

• Strict control is maintained over the external or internal distribution of any media containing card holder data and has to be approved by management

• Strict control is maintained over the storage and accessibility of media

• All computer that store sensitive cardholder data must have a password protected screensaver enabled to prevent unauthorised use. 

• Protect Data in Transit  

All sensitive cardholder data must be protected securely if it is to be transported physically or electronically. 

 

• Card holder data (PAN, track data, etc.) must never be sent over the internet via email, instant chat or any other end user technologies.

• If there is a business justification to send cardholder data via email or by any other mode then it should be done after authorization and by using a strong encryption mechanism (i.e. – AES encryption, PGP encryption, IPSEC, etc.).    

• The transportation of media containing sensitive cardholder data to another location must be authorised by management, logged and inventoried before leaving the premises. Only secure courier services may be used for the transportation of such media. The status of the shipment should be monitored until it has been delivered to its new location. 

• Disposal of Stored Data

• All data must be securely disposed of when no longer required by the Company, regardless of the media or application type on which it is stored.

• An automatic process must exist to permanently delete on-line data, when no longer required.

• All hard copies of cardholder data must be manually destroyed when no longer required for valid and justified business reasons. A quarterly process must be in place to confirm that all non-electronic cardholder data has been appropriately disposed of in a timely manner.

• The Company will have procedures for the destruction of hardcopy (paper) materials. These will require that all hardcopy materials are crosscut shredded, incinerated or pulped so they cannot be reconstructed.

• The Company will have documented procedures for the destruction of electronic media. These will require:

• All cardholder data on electronic media must be rendered unrecoverable when deleted e.g. through degaussing or electronically wiped using military grade secure deletion processes or the physical destruction of the media;

• If secure wipe programs are used, the process must define the industry accepted standards followed for secure deletion.

• All cardholder information awaiting destruction must be held in lockable storage containers clearly marked “To Be Shredded” - access to these containers must be restricted.

• Security Awareness and Procedures  

The policies and procedures outlined below must be incorporated into company practice to maintain a high level of security awareness. The protection of sensitive data demands regular training of all employees and contractors. 

 

• Review handling procedures for sensitive information and hold periodic security awareness meetings to incorporate these procedures into day to day company practice. 

• Distribute this security policy document to all company employees to read. It is required that all employees confirm that they understand the content of this security policy document by signing an acknowledgement form (see Appendix A). 

• All employees that handle sensitive information will undergo background checks (such as criminal and credit record checks, within the limits of the local law) before they commence their employment with the Company. 

• All third parties with access to credit card account numbers are contractually obligated to comply with card association security standards (PCI/DSS).  

• Company security policies must be reviewed annually and updated as needed.  

 

• Credit Card (PCI) Security Incident Response Plan

• The Company PCI Security Incident Response Team (PCI Response Team) is comprised of the Information Security Officer and Merchant Services. The Company PCI security incident response plan is as follows:

• Each department must report an incident to the Information Security Officer (preferably) or to another member of the PCI Response Team. 

• That member of the team receiving the report will advise the PCI Response Team of the incident. 

• The PCI Response Team will investigate the incident and assist the potentially compromised department in limiting the exposure of cardholder data and in mitigating the risks associated with the incident. 

• The PCI Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary. 

• The PCI Response Team will determine if policies and processes need to be updated to avoid a similar incident in the future, and whether additional safeguards are required in the environment where the incident occurred, or for the institution. 

The Company PCI Security Incident Response Team (or equivalent in your organisation):

CIO

Communications Director

Compliance Officer

Counsel

Information Security Officer

Collections & Merchant Services

Risk Manager

Information Security PCI Incident Response Procedures:

• A department that reasonably believes it may have an account breach, or a breach of cardholder information or of systems related to the PCI environment in general, must inform the Company PCI Incident Response Team. After being notified of a compromise, the PCI Response Team, along with other designated staff, will implement the PCI Incident Response Plan to assist and augment departments’ response plans.

Incident Response Notification

Escalation Members (or equivalent in your company):

Escalation – First Level:

Information Security Officer Controller

Executive Project Director for Credit Collections and Merchant Services Legal Counsel

Risk Manager

Director of the Company Communications

Escalation – Second Level:

The Company President

Executive Cabinet

Internal Audit

Auxiliary members as needed

      External Contacts (as needed)

Merchant Provider Card Brands

Internet Service Provider (if applicable)

Internet Service Provider of Intruder (if applicable) Communication Carriers (local and long distance) Business Partners

Insurance Carrier

External Response Team as applicable (CERT Coordination Center 1, etc) Law Enforcement Agencies as applicable inn local jurisdiction

In response to a systems compromise, the PCI Response Team and designees will:

• Ensure compromised system/s is isolated on/from the network. 

• Gather, review and analyze the logs and related information from various central and local safeguards and security controls 

• Conduct appropriate forensic analysis of compromised system. 

• Contact internal and external departments and entities as appropriate. 

• Make forensic and log analysis available to appropriate law enforcement or card industry security personnel, as required. 

• Assist law enforcement and card industry security personnel in investigative processes, including in prosecutions.

The credit card companies have individually specific requirements that the Response Team must address in reporting suspected or confirmed breaches of cardholder data. See below for these requirements.

Incident Response notifications to various card schemes  

• In the event of a suspected security breach, alert the information security officer or your line manager immediately.  

• The security officer will carry out an initial investigation of the suspected security breach.  

• Upon confirmation that a security breach has occurred, the security officer will alert management and begin informing all relevant parties that may be affected by the compromise.   

 VISA Steps

If the data security compromise involves credit card account numbers, implement the following procedure: 

• Shut down any systems or processes involved in the breach to limit the extent, and prevent further exposure.  

• Alert all affected parties and authorities such as the Merchant Bank (your Bank), Visa Fraud Control, and the law enforcement. 

• Provide details of all compromised or potentially compromised card numbers to Visa Fraud Control within 24 hrs.  

• For more Information visit: http://usa.visa.com/business/accepting_visa/ops_risk_management/cisp_if_ compromised.html  

Visa Incident Report Template

This report must be provided to VISA within 14 days after initial report of incident to VISA. The following report content and standards must be followed when completing the incident report. Incident report must be securely distributed to VISA and Merchant Bank. Visa will classify the report as “VISA Secret”*.

• Executive Summary 

• Include overview of the incident 

• Include RISK Level(High, Medium, Low) 

• Determine if compromise has been contained 

• Background 

• Initial Analysis 

• Investigative Procedures

• Include forensic tools used during investigation 

• Findings 

• Number of accounts at risk, identify those stores and compromised 

• Type of account information at risk 

• Identify ALL systems analyzed. Include the following: 

• Domain Name System (DNS) names 

• Internet Protocol (IP) addresses 

• Operating System (OS) version 

• Function of system(s) 

• Identify ALL compromised systems. Include the following: 

• DNS names 

• IP addresses 

• OS version 

• Function of System(s) 

• Timeframe of compromise 

• Any data exported by intruder 

• Establish how and source of compromise 

• Check all potential database locations to ensure that no CVV2, Track 1 or Track 2 data is stored anywhere, whether encrypted or unencrypted (e.g., duplicate or backup tables or databases, databases used in development, stage or testing environments, data on software engineers’ machines, etc.) 

• If applicable, review VisaNet endpoint security and determine risk 

• Compromised Entity Action

• Recommendations

• Contact(s) at entity and security assessor performing investigation

*This classification applies to the most sensitive business information, which is intended for use within VISA. Its unauthorized disclosure could seriously and adversely impact VISA, its employees, member banks, business partners, and/or the Brand.

MasterCard Steps:

• Within 24 hours of an account compromise event, notify the MasterCard Compromised Account Team via phone at 1-636-722-4100. 

• Provide a detailed written statement of fact about the account compromise (including the contributing circumstances) via secured e-mail to  compromised_account_team@mastercard.com. 

• Provide the MasterCard Merchant Fraud Control Department with a complete list of all known compromised account numbers. 

• Within 72 hours of knowledge of a suspected account compromise, engage the services of a data security firm acceptable to MasterCard to assess the vulnerability of the compromised data and related systems (such as a detailed forensics evaluation). 

• Provide weekly written status reports to MasterCard, addressing open questions and issues until the audit is complete to the satisfaction of MasterCard. 

• Promptly furnish updated lists of potential or known compromised account numbers, additional documentation, and other information that MasterCard may request. 

• Provide finding of all audits and investigations to the MasterCard Merchant Fraud Control department within the required time frame and continue to address any outstanding exposure or recommendation until resolved to the satisfaction of MasterCard. 

Once MasterCard obtains the details of the account data compromise and the list of compromised account numbers, MasterCard will:

• Identify the issuers of the accounts that were suspected to have been compromised and group all known accounts under the respective parent member IDs. 

• Distribute the account number data to its respective issuers.

Employees of the company will be expected to report to the security officer for any security related issues. The role of the security officer is to effectively communicate all security policies and procedures to employees within the company and contractors. In addition to this, the security officer will oversee the scheduling of security training sessions, monitor and enforce the security policies outlined in both this document and at the training sessions and finally, oversee the implantation of the incident response plan in the event of a sensitive data compromise. 

Discover Card Steps

• Within 24 hours of an account compromise event, notify Discover Fraud Prevention at (800) 347-3102 

• Prepare a detailed written statement of fact about the account compromise including the contributing circumstances 

• Prepare a list of all known compromised account numbers 

• Obtain additional specific requirements from Discover Card 

American Express Steps

• Within 24 hours of an account compromise event, notify American Express Merchant Services at (800) 528-5200 in the U.S. 

• Prepare a detailed written statement of fact about the account compromise including the contributing circumstances 

• Prepare a list of all known compromised account numbers Obtain additional specific requirements from American Express

• Transfer of Sensitive Information Policy

• All third-party companies providing critical services to the Company must provide an agreed Service Level Agreement.

• All third-party companies providing hosting facilities must comply with the Company’s Physical Security and Access Control Policy.

• All third-party companies which have access to Card Holder information must

• Adhere to the PCI DSS security requirements.

• Acknowledge their responsibility for securing the Card Holder data.

• Acknowledge that the Card Holder data must only be used for assisting the completion of a transaction, supporting a loyalty program, providing a fraud control service or for uses specifically required by law.

• Have appropriate provisions for business continuity in the event of a major disruption, disaster or failure.

• Provide full cooperation and access to conduct a thorough security review after a security intrusion by a Payment Card industry representative, or a Payment Card industry approved third party.

• User Access Management

• Access to Company is controlled through a formal user registration process beginning with a formal notification from HR or from a line manager. 


Color kits and online consultations

MSDS Warning :

  • Designed for simple gray coverage, to add shine and correct brassiness in blondes. 

  • Kit includes al necessary components to do a new growth [permanent and gray coverage 4oz] and global [semi gloss toners 6oz] application.

  • Not designed to highlight or lighten hair. Those colors need to be done by a professional.

  • This is a simple do it at home solution, however it does not replace your local professional hairdresser. 

  • It is your responsibility to purchase the appropriate formula and follow the directions for your desired outcome. 

  • When choosing your color, keep it simple. Choose the color that matches closest to your existing color. Remember this is not meant to do a look change. You can mess up your hair color bad. If you need a look change, see your local colorist.

  • Under NO circumstances [even with a purchased consultation] can we be held responsible for the outcome of your hair color [purchased from our site or elsewhere] and your hair's integrity. You are coloring your hair at your own risk.  

  • Seller is not responsible for any damage, health risks, allergic reactions, outcome and cannot be held accountable. Read the labels carefully.

  • Keep products out of reach for children.

  • Opened product has a 30 day shelf life.

  • Store room temperature out of direct sunlight.

  • Product is non returnable.

  • For allergy control read labels carefully, all hair color contains PPD in some shape or form. Seller cannot be held responsible if allergic reaction occurs.