For defective merchandise, we must be notified within 24 hours of acceptance of delivery. The defective merchandise must be returned at our cost and a replacement will be shipped to the same address at no charge once we receive the defective merchandise and verify the defect.
Unused merchandise can be returned in original package within 5 days of acceptance of delivery for full credit, provided we receive notice within the specified time frame. Purchaser pays shipping.
Used merchandise is not returnable – this would include urns that contain cremated remains.
For preneed services, the irrevocable insurance policy is transferable to any other funeral home or cremation society, however it is not refundable. If you do transfer the policy the price guarantee may not be honored by the other funeral home or cremation society.
For prompt service, call us at: 718-442-9047.
Cherubini McInerney Funeral Home may publish obituaries on our web site that we have been asked to submit for publication to local/national media. In accordance with family wishes, information about services that families request remain private will not be published. We will honor any written requests from the decedent’s legal next of kin to remove a published obituary.
We reserve the right to edit, or refuse to list, a condolence that contains language that is unlawful, harmful, fraudulent, threatening, abusive, defamatory, vulgar, obscene, profane, hateful, racially, ethnically, or otherwise objectionable, or encourages conduct that might constitute a criminal offense.
We reserve the right to change the information contained in this web site without notice. Our company is not responsible for any unintentional errors that may be contained in this web site. Links to other web sites are provided for the convenience of the user and should not be construed as an endorsement of another web site or of the business referred to, or promoted, in another web site. We grant permission for any user to follow links to other web sites, but we cannot be held responsible for any content errors, copyright violations, libelous statements, offensive subject matter, or any other material that may be contained in those web sites, or in any succeeding web sites that may be reached by following those links.
We understand that privacy is an important issue for visitors to our web site. The following information is designed to help visitors understand what information we may gather from our site, and how we may use this information once it has been gathered.
Our funeral home(s) may collect personal information that site visitors provide when they complete any online form, application, or survey. Information provided in a request for service or information link/e-mail will be forwarded to one of our associates or affiliates so that a staff member can respond to the request. Our funeral home(s) may contact any visitor who has submitted a request for additional information, regarding the request.
Our company is the sole proprietor of all data files gathered and we do not rent or sell visitors’ personal information to non-affiliate companies without the consent of the visitor.
Site Visitorship Data
Our Funeral Home(s) uses aggregated website visitorship data to improve the content and services offered to site visitors. All reports cite visitorship data on an aggregate, anonymous basis, which means that no personal information is associated with it. This data may include:
- The number of people who visit our site
- The pages they visit
- The amount of time they stay on our site
- The domain name of the site where visitors are connecting from (aol.com for example)
If visitors submit credit card information in an on-line form, our company uses SSL (Secure Socket Layer) encryption technology to protect the information they submit. This technology protects visitors from having their information intercepted by anyone other than our company while it is being transmitted. Our company works hard to ensure that our systems are secure and that they meet industry standards. Where appropriate, we employ firewalls, encryption technology, user authentication systems (e.g., user names and passwords) and access control mechanisms to control access to systems and data.