Shipping and Returns Policy
We strive to ship your item(s) within 2 business days of receiving your order.
Delivery of shipped items normally occurs within 1-5 days of shipment. We will determine the most efficient shipping carrier for your order. The carriers that may be used are: U.S. Postal Service (USPS), United Parcel Service (UPS) or FedEx. We will provide a tracking number once the item has been shipped. Sorry, but we cannot ship to P.O. Boxes.
We will be happy to exchange your merchandise within 14 days of purchase. Please note: All products must be returned in their original condition; unused, unworn and unwashed and can be exchanged for any item of the same value. Return shipping charges are the responsibility of the customer unless there was an error on the part of USSSA East.
We are committed to providing high quality merchandise to our customers. If an item leaves our shipping department with unnoticed damage or is damaged during shipping, contact us at email@example.com. Please attach a photo of the damaged item.
For event specific refund policies, please refer to the event page of our website.
What about security? How secure is Business Catalyst?
Besides what is publicly available, we cannot disclose any additional details about our infrastructure and security systems in place, since this is considered sensitive information. Here is the information that you can share with your customer:
- Business Catalyst has a multitude of security mechanisms in place, such as AAA (Authentication, Authorization, and Access Control), attack detection and annihilation mechanisms, encryption of sensitive data, firewalls, anti-virus, etc.
- Business Catalyst is a PCI Level 1 compliant product. Accordingly, all cardholder data specific mechanisms, environments, policies, procedures, etc. have been audited for security compliance by an accredited 3rd party investigator.
- The Business Catalyst code and environments are regularly tested for security holes both manually and using various 3rd party penetration software. A multitude of security standards (e.g., OWASP) are considered and followed.