Step three: Purchase your products
When viewing the details of your search results, you can add products to your shopping cart for purchasing by selecting the box next to the products you want to purchase and selecting the "Add to cart" button. A window confirming your selection will then be displayed.
To view your shopping cart, select the "View cart" button beneath the shopping cart icon on the top right hand side of the screen. Alternatively, you can select the "Check out" button at the bottom of the screen.
By viewing your shopping cart, you can make sure you have all the products you want to purchase and remove any unwanted products.
To remove a product when viewing your shopping cart, select the box next to the unwanted product and select the "Remove" button.
Once you have selected the paid products you wish to purchase, you can select the "Pay Now" button. You will then be prompted to provide your credit card details and your email address.
We accept Visa, and MasterCard. We do not accept any other method of payment.
The protection and security of information that you provide on this website is very important and strict industry standards are applied at all times.
Payment information that you enter when using this site is processed and stored in accordance with the Payment Card Industry Data Security Standard (PCI DSS). This Standard has been developed by the PCI Security Standards Council which is an open global forum responsible for the ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection.
The information that you provide is protected through the use of Secured Socket Layer (SSL) 128 bit encryption. You will notice that the URL in your browser is "HTTPS" instead of "HTTP". This is because this security feature has been invoked. Your browser may also display a lock symbol on the bottom task bar line to indicate that a secure website is being used.
The storage of payment information on the host server used by this website is protected from external networks by the deployment of firewalls and proxy servers.