There are many benefits to opting for a drawstring over the classic tote bag; they have an unrivalled price point for a multipurpose product and offer an excellent colour range, with new colours added regularly. Printed nylon bags offer a quick-dry solution, making them perfect for swimming and sports, but a limitless range of industry sectors also, from education, government, corporate and gift shop retail. The drawstrings allow you to go hands-free, perfect for events where you need your hands on your mobile devices and free to browse products and literature at trade shows that you can't achieve so quickly with standard handled tote bags.
Whether cotton or nylon, drawstring bags are branded in various ways, depending on the artwork design and the bag material. Like other tote bags, the screen print method is popular, but transfer and dye sublimation is also a good choice for full-colour designs, where there will be no restrictions. Dye sublimation is ideal for 100% polyester options, whereas transfer works well with cotton. Screen printing is used on both materials, producing excellent results each time.
Free Phone: 0800 084 24 24
Local Call: 0116 275 2330
We use cookies, tracking pixels and related technologies on our website. Cookies are small data files that are served by our platform and stored on your device. Our site uses cookies dropped by us or third parties for a variety of purposes including to operate and personalize the website. Also, cookies may also be used to track how you use the site to target ads to you on other websites.
Our website employs the use the various third-party services. Through the use of our website, these services may place anonymous cookies on the Visitor's browser and may send their own cookies to the Visitor's cookie file. Some of these services include but are not limited to: Google, Facebook, Twitter, Adroll, MailChimp, Sucuri, Intercom and other social networks, advertising agencies, security firewalls, analytics companies and service providers. These services may also collect and use anonymous identifiers such as IP Address, HTTP Referrer, Unique Device Identifier and other non-personally identifiable information and server logs.