Red Trim Navy Buckle Dress
Never worn, with tag - A never-worn item with tag is an item which has never been worn and still has the original purchase hangtags on it (include a photo of the tag).
Never worn - A never-worn item without a tag is an item which has never been worn and shows no defects or alterations.
Very good - An item in very good condition is a second-hand item which has been only lightly used and extremely well maintained, which can show slight defects from usage. These must be mentioned in the description and visible on the photos.
Good - An item in good condition is a second-hand item which has been worn and well maintained. If the item has defects, they must be mentioned in the description and visible in the photos.
Fair - An item in fair condition is a second-hand item which has been worn frequently and shows defects (these are mentioned in the description and visible in photos).
Questions about conditions? Please email us at firstname.lastname@example.org
Our Authentication Process
Consigned Sealed Delivered has created a meticulous authentication process in the UK to create a safe and reputable platform for authenticated luxury consignment. We authenticate every single item to fulfill our mission to gain and maintain your trust. We pride ourselves in our team of authentication experts who strive to sustain the integrity of luxury designers.
With the CSD Seal, It's Guaranteed Real
We authenticate every single item to ensure that we maintain the highest standards to keep fakes off the market and put counterfeits out of business. Once items arrive at CSD HQ in London, they are grouped and identified according to their authenticity risk, based on their brand, market value, fashion category, consignor data, etc. The higher the risk for counterfeit, the more rigorous the process.
Our Quality Control team adds an additional layer of control and protection to ensure that fakes are not sold on CSD.shop. By using the Real Authentication https://www.realauthentication.com/ Smart Database Scan technology and authentication specialists, we assess certain at-risk items for further review.
For any inquiries about authenticity please contact: email@example.com