STRIPE TERMS AND CONDITIONS

STRIPE

Inner City Design & Print Ltd uses the 3rd party payment platform, Stripe, the Stripe API, and in conjunction, your Stripe account to process credit and debit card transactions.

By using the Stripe Check Out you agree to be bound by Stripe’s Terms of Service.

You expressly understand and agree that Inner City Design & Print Ltd shall not be liable for any payments and monetary transactions that occur through Your use of the Service. You expressly understand and agree that all payments and monetary transactions are handled by Stripe. You agree that Inner City Design & Print Ltd shall not be liable for any issues regarding financial and monetary transactions between You and any other party, including Stripe.

You are responsible for all transactions (one-time, recurring, and refunds) processed through the Service and/or Stripe. Inner City Design & Print Ltd is not liable for loss or damage from errant or invalid transactions processed with Your Stripe account. This includes transactions that were not processed due to a network communication error, or any other reason. If You process a transaction, it is Your responsibility to verify that the transaction was successfully processed.

You understand that Inner City Design & Print Ltd uses the Stripe API to run the Service and that the Stripe API is subject to change at any time and such changes may adversely affect the Service. You understand and agree to not hold Inner City Design & Print Ltd liable for any adverse affects that actions (whether intentional or unintentional) on the part of Stripe may cause to Your Stripe account, or Your business.

You must not process stolen credit cards, or unauthorised credit cards through Stripe.

TRANSACTION SECURITY

All transaction information passed between Inner City Design & Print Ltd and Stripe's systems is encrypted using 256-bit SSL certificates. No cardholder information is ever passed unencrypted. You can be completely assured that nothing we pass to Stripe's servers can be examined, used or modified by any third parties attempting to gain access to sensitive information.