Credit Card Security

    Credit cards numbers are only submitted to the HLCCA when encrypted. If you are ever unsure about encryption features, be sure to check for a lock icon in your browser when submitting financial information. The HLCCA does not store your credit card number on its systems, instead immediately sending it to our credit card processor through an encrypted session. At no time during your transaction are they viewable to anyone who may be listing to your session.


    The HLCCA stores information in our database about our members and others who purchase items from us. That information is only used to process transactions and provide the best possible services to our members. This information has never been and will never be sold or rented to other people or organizations.


    The "cookie" feature of web browsers is required to access many features of the HLCCA website. A cookie is a small piece of information which is stored on your computer and is available to use by websites. The cookie we set is used solely for providing a better user experience by enabling features such as the shopping cart.


    Purchases of membership are non-refundable. Back issues of The Dish and sales of pottery are non-refundable and non-exchangable (with the exception of exclusive pitchers). Exclusive pitchers are non-refundable, but may be exchanged in the event of a major flaw or breakage in shipping. Books may be returned if they are not damaged. Conference refunds policies vary from year-to-year. Call for information on the policy for the next conference.

This computer system, including all related equipment, networks and network devices (specifically including Internet access), are provided only for authorized HLCCA use. HLCCA computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security. Use of this HLCCA computer system, authorized or unauthorized, constitutes consent to monitoring of this system.

Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative and/or criminal action.