Privacy Policy

The privacy policy below has been put together to serve those who are concerned with how their ‘Personally Identifiable Information’ (PII) is being used online. As described in US privacy law and information security PII is any information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please go through our privacy policy to get an understanding of how do we collect, use, protect or handle your Personally Identifiable Information in accordance with our website.

1. What personal information do we collect from our users visiting our blogs, website or app?

While ordering or registering on our site, as appropriate, we may ask your name, email address or other details to help you make your experience better.

2. When do we collect information?

We do this whenever a user places an order, subscribe to any newsletter, fill out a form, fill any sort of information on our website or provide us with feedback on our products or services.

3. How do we use your information?

We may use the collected information in the below mentioned ways:

  • To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
  • To improve our website in order to better serve you.
  • To allow us to better service you in responding to your customer service requests.
  • To administer a contest, promotion, survey or other site feature.
  • To quickly process your transactions.
  • To ask for ratings and reviews of services or products
  • To follow up with them after correspondence (live chat, email or phone inquiries)

4. How do we protect your information?

We conduct security scans on regular intervals to identify malware and repair security holes and known vulnerabilities to make your visit safe and secure.

Any of your personal information is contained behind secured networks and is only accessible by a limited number of cybersecurity professionals who have special access rights for such systems and are programmed to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.

We take a variety of security measures when any user places an order submits, or accesses their information so we can keep your personal information safe.

All transactions are processed through a gateway provider and are not stored or processed on our servers.

5. What are cookies? Do we use them on our website?

Firstly, Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the site’s or service provider’s systems to recognize your browser and capture and remember certain information.

Yes, we usage of cookies happens in many forms on our website like we use cookies to help us remember and process the items in your shopping cart. It also helps us understand your preferences based on previous or current site activity, which enables us to provide you with improved services and offers. We also use them to help us compile aggregate data about website traffic and interaction so that we can offer better website experiences and tools in the future.

  • Some of the most common reasons for the usage of cookies:
  • Process the items in the shopping cart.
  • Understand and save user’s preferences for future visits.
  • Keep track of advertisements.
  • For better user experience.

Along with third-party vendors such as Google, we use first-party cookies such as the Google Analytics cookies and third-party cookies such as the DoubleClick cookie or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.

Opting out:

Users can set inclinations for how Google publicizes to you utilizing the Google Ad Settings page. On the other hand, you can quit by visiting the Network Advertising Initiative Opt-Out page or by utilizing the Google Analytics Opt Out Browser add on.

California Online Privacy Protection Act

CalOPPA is the principal state law in the country to require business sites and online administrations to post a security approach. The law achieve stretches well past California to require any individual or organization in the United States (and possibly the world) that works sites gathering Personally Identifiable Information from California shoppers to post an obvious protection strategy on its site expressing precisely the data being gathered and those people or organizations with whom it is being shared. – See more at: assurance act-caloppa/#sthash.0FdRbT51.dpuf

As indicated by CalOPPA, we consent to the accompanying:

Clients can visit us namelessly.

When this protection arrangement is made, we will include a connection to it our landing page or as a base, on the main noteworthy page subsequent to entering our site.

Our Privacy Policy connection incorporates the word 'Privacy' and can without much of a stretch be found on the page indicated previously.

You will be informed of any Privacy Policy changes:

On our Privacy Policy Page

You can change your own data:

By messaging us

By calling us

By signing in to your account

6. How does our site handle “Do Not Track” signals?

We respect Do Not Track flag and Do Not Track, plant cookies, or use advertising tools when a Do Not Track (DNT) program component is set up.

7. Does our site allow third-party behavioral tracking?

Yes, we do allow third-party behavioral tracking

COPPA (Children Online Privacy Protection Act)

With regards to the accumulation of individual data from youngsters younger than 13 years of age, the Children's Online Privacy Protection Act (COPPA) places guardians in charge. The Federal Trade Commission, United States' protection agency, authorizes the COPPA Rule, which spells out what administrators of sites and online administrations must do to ensure kids' security and wellbeing on the web.

Do we let third-parties, including ad networks or plug-ins, collect PII from children under 13?

We don't explicitly market to youngsters younger than 13 years of age.

Fair Information Practices

The Fair Information Practices Principles structure the foundation of security law in the United States and the ideas they incorporate have assumed a critical job in the advancement of data protection laws around the world. Understanding the Fair Information Practice Principles and how they ought to be executed is basic to consent to the different security laws that ensure individual data.

In order to be inline with Fair Information Practices we will take the following responsive action, should a data breach occur:

We will notify you via email within a business day

We likewise consent to the Individual Redress Principle which necessitates that people reserve the privilege to legitimately seek after enforceable rights against information authorities and processors who neglect to stick to the law. This rule requires not just that people have enforceable rights against data users, yet in addition that people have a plan of action to courts or government offices to explore and additionally arraign resistance by data processors.

What is CAN-SPAM Act?

The CAN-SPAM Act is a law that sets the principles for business email, builds up prerequisites for business messages, gives beneficiaries the privilege to have messages halted from being sent to them, and spells out intense punishments for infringement.

Why do we collect your email address?

To send information, respond to inquiries, and/or other requests or questions.

To process orders and to send information and updates pertaining to orders.

To be in accordance with CANSPAM, we agree to the following pointers:

  • Distinguish the message as an ad in some sensible manner.
  • Incorporate the physical location of our business or site base camp.
  • Monitor outsider email promoting administrations for consistence, on the off chance that one is utilized.
  • Respect quit/withdraw demands quickly.
  • Enable clients to withdraw by utilizing the connection at the base of each email.

On the off chance that whenever you might want to withdraw from getting future messages, you can email us by:

Following the instructions at the bottom of an email and we will remove you from all our mailing lists immediately.

Data can be shared as a recommended business to the inquiries only

We are often been asked for recommendations of businesses for a category search. At that time, we shall refer the quality business detail as a response to the inquiry

How do you connect with us?

In an event where there are any inquiries with respect to this security strategy, you may reach us utilizing the data underneath.