Types of policies in e-commerce, Computer Engineering

Assignment Help:

1- The Privacy Policy:

The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them in any illegal issues.

2- The Security Policy:

The vendor must explain to the customer that the money information will be totally secured, like credit card details, and the customer will be informed when the money for the current operation gets decremented from his balance.

3- The Delivery and Shipping Policy:

The vendor must explain to the customer how and when the purchased products will be delivered, and if there are any charges for the shipment.

4- The Return Policy:

The vendor must explain if the purchased products could be returned or not, and if yes then they could be returned under what conditions, within how many days after the delivery.

5- The Replace or Refund Policy:

The vendor must explain when and how the customer returns the purchased product and the available options he can choose from.

6- Customer Satisfaction Policy:

The vendor must explain to the customer how to guarantee that he will be satisfied with the product or service, and how to measure his satisfaction. Also the vendor must take care of their feedbacks.

7- The Warranty Policy:

The vendor must explain to the customer if the purchased product will be under warranty or not and for how long, and under what conditions.

When a customer decides to purchase a product or to get a service online he should read carefully the policies of the vendor, so he knows how all his rights will be saved, as polices are not standard for all vendors, and not all vendors explain clearly their policies, so the customer must be careful to not be a victim of crooks.


Related Discussions:- Types of policies in e-commerce

General use of cluster computing, Q. General use of cluster computing? ...

Q. General use of cluster computing? A general use of cluster computing is to balance traffic load on high-traffic web sites. In web operation a web page request is transmitted

What is meaning of term byte stuffing, The term byte stuffing refers to: ...

The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.

What is dialog box, This is a small window that is demanding your attention...

This is a small window that is demanding your attention. You must respond before you can carry on using the program that shown the dialog box. A dialog box does not have a minimize

Isoquants, what are the types of isoquants

what are the types of isoquants

Related to Project, PROCEDURE TO CREATE PROJECT IN COLLABORATION SYSTEM

PROCEDURE TO CREATE PROJECT IN COLLABORATION SYSTEM

Multithreaded architecture, Multithreaded Architecture:  It is clear now th...

Multithreaded Architecture:  It is clear now that if we give many contexts to multiple threads, then processors with multiple contexts are known as multithreaded systems. These sys

Demorgan''s first theorem, DeMorgan's first theorem shows the equivalence o...

DeMorgan's first theorem shows the equivalence of which logic gate ? Ans. DeMorgan's first theorem depicts the equivalence of NOR gate and Bubbled AND gate. For De Morgan's

Shape - elements of composition, Shape : A shape is any area that can b...

Shape : A shape is any area that can be perceived to have height and width. Shapes within an image can be created by the use of line, or by the edges created by variations in c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd