The Illuminati Terrene 14 light spiral LED pendant features a polished gold effect ceiling mounted plate from which the 14 pendants are suspended at different lengths on thin wire.
Each pendant is an egg shape made in a polished gold effect and bubble clear glass, the 14 pendants are adjustable to enable a spiral or random effect
The 4.8W LED bulb in each shade produces a warm light that comes through the bubble glass and as a downlight through a hole in the bottom of each shade.
This fitting is dimmable and supplied complete with LED bulbs.
Each wire is individually adjustable in length.
Each ‘egg’ measures 13cm in length x 9.5cm in diameter approx.
This range is also available in Chrome, the complete Terrene range can be viewed here
In order to ensure your light fitting arrives in perfect condition, it may require some simple assembly to complete installation.
NB: The LED is integrated and is not replaceable with a standard LED purchased locally. However, if you do experience an issue with the LED, the whole ‘egg’ shape can be purchased from illuminati and is easily replaced.
Fitting can be dimmed using leading edge or trailing edge dimmers which are compatible with electronic transformers and LED light source.
The cut-off time for orders to be dispatched the same day is 1pm.
c) Goods supplied are not for resale.
Returns/Options to cancel
• The fitting before it is repackaged
• An internal photo of the fitting in the box showing it is securely packaged
• Photos of the outside of the box as returned
NB: Your refund may be refused if the fitting arrives back damaged due to insufficient packaging
You should return the fitting to the warehouse address we give you within 7 working days .
Credit Card Security
Encryption and Data Storage
Links to banks
What is PCI?
PCI is applicable to all/any entities that store, process or transmit cardholder data and consists of the following requirements:
· To build and maintain a secure network
· To protect cardholder data
· To maintain a vulnerability management program
· To implement strong access control measures
· To regularly monitor and test networks
· To maintain an Information Security Policy