Refund policy

All custom item sales are final. No refunds or exchanges on custom items.

If you were sent the wrong item or a defective product contact us via email to resolve.

All subscriptions will be valid until the end of the most recent paid billing cycle.

Security Policy

End-User Encryption Key Protection Policy

Last Update Status: Updated February 2020

Secret Key Encryption Keys – Keys used for secret key encryption, also called symmetric cryptography, are protected as they are distributed to all parties that will use them. During distribution, the symmetric encryption keys must be encrypted using a stronger algorithm with a key of the longest key length for that algorithm. If the keys are for the strongest algorithm, then the key must be split, each portion of the key encrypted with a different key that is the longest key length authorized and each encrypted portion is transmitted using different transmission mechanisms. The goal is to provide more stringent protection to the key than the data that is encrypted with that encryption key.

Symmetric encryption keys, when at rest, must be protected with security measures at least as stringent as the measures used for distribution of that key.

  • Public Key Encryption Keys

Public key cryptography, or asymmetric cryptography, uses public-private key pairs. The public key is passed to the certificate authority to be included in the digital certificate issued to the end-user. The digital certificate is available to everyone once it issued. The private key should only be available to the end-user to whom the corresponding digital certificate is issued.

The public-private key pairs used by the public key infrastructure (PKI) are generated on the tamper-resistant smart card issued to an individual end-user. The private key associated with an end user’s identity certificate, which is only used for digital signatures, will never leave the smart card. This prevents the Infosec Team from escrowing any private keys associated with identity certificates. The private key associated with any encryption certificates, which are used to encrypt email and other documents, must be escrowed in compliance with the company policies.



Shipping Policy

All in-stock products leave our warehouse within 1-2 business days.

All custom items leave our warehouse 5-7 business days after the order is placed unless otherwise noted.

Domestic Shipping Rates

Shipping will be $5.18 per order.

Shipment to P.O. boxes or APO/FPO addresses are accepted.

International Shipping Rates

To be calculated during checkout.

Shipment confirmation & Order tracking

To be provided upon checkout.

Privacy Policy


If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.


For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.


Terms and Conditions

We know your right to privacy online is important. You do not have to identify yourself or divulge personal information unless you choose to give us your personal information.

Should you choose to share your personal information, we would like you to know how that information is used by us to provide better user experience, and the steps we take to protect your information. This privacy policy has been created to answer any questions you may have regarding the data collection and protection policies.

We reserve the right to change this Policy.  As a service to our users, we will post the date of the most recent updates to this policy at the top of the page.

What information is being collected?

Use of cookies and protecting your privacy: We make use of cookies to personalize and customize your interaction to provide you with the best possible online experience. A cookie is a tiny encrypted text file that is placed on your hard drive.

A cookie will be used to recognize your computer in order to improve your experience on our site. Using a cookie, allows you to bypass future log-ins and remembers your preferences to make navigation as easy and seamless as possible.

How we analyze our website to better serve you: We use a third-party analytics provider, such as Google Analytics, to collect internet log information and assess the aggregate level of traffic to the our website and its affiliates, including what pages people are visiting, and to diagnose any potential problems with the Web site.

These aggregated performance reports contain information including but not limited to “Internet Protocol” or IP address, unique device ID, type of mobile device, date and time, web browser, referring website and general geographic location. We do not use analytics reports to track a particular individual’s use of the our website.  Aggregated data does not identify you as an individual. All users remain anonymous unless they choose to give us personally identifiable information.  You can learn more about Google Analytics by clicking here or opt out of being tracked via Google Analytics across the web here:

We ask that children under 18 do not submit their information: In accordance with the Federal Children’s Online Privacy Protection Act of 1998 (COPPA), we  does not knowingly collect information from children. Additionally, In accordance with (COPPA), we will never knowingly collect personal identifiable information from persons 13 years old or younger.

Parents with questions may contact us with any questions

How is the information collected used?

We personalize the website and email communications. When you offer your personal information and/or choose to participate in our volunteer efforts, we use your information to personalize and customize Web pages and emails from our company to you.

Is my information secure, and how can I manage my online information?

Protecting information you provide. Protecting your information is important as we use a secure socket layer (SSL) – with the highest level of encryption commercially available – on every page of the website.

Strict security measures are in place to protect the loss, misuse, and alteration of any and all information pertaining to our company.  Access to personally identifiable information is limited to dedicated staff and vendors subject to non-disclosures agreements. To ensure the highest level of security we employ best practices, including running the website on secure servers located in a protected location.

However, no data transmission over the Internet can be guaranteed as 100% secure.  As a result, while we strive to protect your information, we cannot ensure or warrant the security of any information you transmit to us or receive from us.

We use a secured/encrypted server for online credit card transactions. The online contribution form is in compliance with FEC regulations. We have put in place appropriate physical, electronic and managerial procedures to prevent unauthorized access.

If you would like to opt-out of third-party behavioral advertising, please visit the Digital Advertising Alliance site,

For additional information on managing cookies, please select your browser below:

Links to other sites: Our site may contain links to other Web sites and servers. we do not bear responsibility for privacy policies or content on linked Web sites.

Accordingly, you also acknowledge that we will not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any such content, services on or through any such site or resource or goods. We encourage you to read the privacy statements on each Web site you visit.

Can I opt-out of campaign mailings?

Communicating via email is one of the most powerful online tools we use. We’re sure you will find the information useful and take advantage of the opportunities to assist the Party.

When registering on our website, donating, signing a petition, participating in a survey, or submitting information for volunteer opportunities please know that you are opting to receive these emails by providing your email address. All signups for email communications and other features of our web site are voluntary. We give you the opportunity to opt-in and we give you the power to opt-out of email communications. Should you wish to opt-out, an unsubscribe link is included in every email. If your link is not working properly, or you wish to communicate your desire to opt-out directly to us via Email, with Unsubscribe in the subject line.


Renewal Policy

Automatic Renewal Terms: All memberships carry a specific term. Membership will automatically renew on your renewal date.  As per our terms and conditions, you agree to be billed dues with the method previously used and kept on file with us.  If you do not wish to renew your membership, please cancel your membership no later than 30 days prior to your renewal date.

Cancellation Policy

All membership dues may be canceled and a full refund issued within the first 30-days of your membership date.  All members wishing to cancel their membership after the 30-day grace period are subject to the company’s approval and may be subject to fees.  If you have any questions, please contact us.

Frequently Asked Questions

What am I buying when I sign up for close Friends?

You’re buying access to @ericwhiteback’s Close Friends stories on Instagram, which will only be visible to you and other Close Friends. You will also receive exclusive access to Eric’s discord, and multiple other perks as laid out in the Close Friends section of this website.


It may take up to 24 hours for you to be added to @ericwhiteback’s Close Friends list on Instagram. However, you should receive a confirmation email right away. This email will include directions on how to instantly access Eric’s discord.


You will receive a personal DM from @ericwhiteback confirming when you have been added.


Please email with your order number and your Instagram username.


Please email your order number, the email address you signed up with, and the new email address you’d like on your account.


Please email your order number, the IG username you entered, and the new IG username you’d like on your account.


By signing up for Eric’s Close Friends, you are automatically entered for all giveaways.


Your card will be billed upon purchase (unless we are running a free trial promotion), and once every 30 days thereafter.


Your subscription can be canceled at any time on the my account section of our website. In the event that you cancel your subscription, you will still receive all Close Friends services until your next billing cycle occurs.