Through the website, we may collect, store, and utilize the following types of information.
Third-party companies provide third-party advertisements on our websites and other such websites where we advertise. These third-party companies use the information of user visits to our website. Whenever these advertisements are displayed to the user, the third-party companies place their unique cookies on the user’s browser. Through these cookies, ads are displayed whenever users visit the site. Also, the website may utilize web beacons that are offered by third-party advertising companies for the supervising online advertisements. Using web beacons, the website can recognize the cookies as and when the user visits the website. The web beacons also allow the site to recognize banner ads that directed the user to the website.
Web Beacons: These are programming code used for the display of an image on a web page. Web beacons are utilized to transfer the unique user identification of the user to a database. This unique user identification is usually in the form of a cookie, which is utilized to link the individual user to the acquired information in the database. Web beacons help in the tracking of individual online visits to the website. Such tracking enables the regulation of services and products that a user may be interested in. Also, this allows the tracking of online behavioral patterns of users for marketing purposes.
Cookies: These are small data parts created by a web server. Cookies are distributed through a web browser and stored on the user’s computer. These help in the tracking of the online patterns and preferences of the user. Additionally, cookies help to identify the user as a return visitor. These also create customization of a user’s web experiences so the user does not need to add every information, every time they visit the website. The users visiting the website have to accept the cookies whenever they visit the site to get access to all the features.
IP Address: The website gathers the user’s IP address to ascertain problems with our server and manage issues. IP is the number assigned to a user’s computer whenever they use the Internet. IP address is required to recognize a user during any online session. Also, it is used for the collection of data based on demographics.
Usage Tracking and Log Files: The website tracks associated information of all the web pages viewed by visitors. Also, the website tracks all the information related to every hyperlink clicked by the user as and when they visit any of our websites or while viewing our emails. Log files are utilized for tracking and monitoring of member usage.
The personal information received by us via the website shall be used only for specific purposes mentioned in the policy.
We may utilize the personal information provided by the user to:
It should be noted here that no part of user personal information will be published on third-party companies for purposes such as direct marketing, without a consensus.
In the event a user provides any personal information to be published on the website, we shall publish the content and/or use the furnished data in concurrence with the license that the user has allowed to us. The user can use the privacy settings to stop the distribution of the personal information provided to our website. This can be changed using the privacy controls on the site.
All the financial transactions related to the website are managed by our payment service provider. We can share any personal information given by a user with our payment service provider for purposes including complaints, queries, and payments, and refunds.
The COMPANY uses industry-standard guidelines for protecting and safeguarding individual data. Also, the COMPANY uses standard safety measures to prevent the misuse, change, or loss of data. Users are informed that the storage technique, or the measure of transmitted information over the Internet is not completely secure. Although we do our best to save and shield our users’ personal information, we can’t ensure its complete security. Also, while we ensure to take all efforts to secure the networks and systems, we do not provide any guarantee that these security measures would stop any third-party hackers from unlawfully accessing the personal information.
Write to us