Before or at the time of collecting personal information, we will identify the purposes for which information is being collected.
We will gather and utilization of individual data singularly with the target of satisfying those reasons indicated by us and for other good purposes, unless we get the assent of the individual concerned or as required by law.
We will just hold individual data the length of essential for the satisfaction of those reasons.
We will gather individual data by legal and reasonable means and, where fitting, with the information or assent of the individual concerned.
Personal information ought to be important to the reasons for which it is to be utilized, and, to the degree essential for those reasons, ought to be exact, finished, and updated.
We will protect individual data by security shields against misfortune or burglary, and also unapproved access, divulgence, duplicating, use or alteration.
We will promptly provide customers with access to our policies and procedures for the administration of individual data.
We are focused on leading our business as per these standards with a specific end goal to guarantee that the privacy of individual data is secure and maintained.
Information Collection, Use, and Sharing
In common with other websites, log files are stored on the web server saving details such as the visitor’s IP address, browser type, referring page and time of visit.
Cookies may be used to remember visitor preferences when interacting with the website.
Where registration is required, the visitor’s email and a username will be stored on the server.
The information is used to enhance the visitor’s experience when using the website to display personalised content and possibly advertising.
Email addresses will not be sold, rented or leased to 3rd parties.
Email may be sent to inform you of news of our services or offers by us or our affiliates.
If you have subscribed to one of our services, you may unsubscribe by following the instructions which are included in email that you receive.
Cookies are small digital signature files that are stored by your web browser that allow your preferences to be recorded when visiting the website. Also they may be used to track your return visits to the website.
You can control and/or delete cookies as you wish – for details, see aboutcookies.org
. You can delete all cookies that are already on your computer and you can set most browsers to prevent them from being placed. If you do this, however, you may have to manually adjust some preferences every time you visit a site and some services and functionalities may not work.
Blocking cookies may prevent you from access to certain features of the website.
You can opt-out of the collection and use of information for ad targeting – for details, see aboutads.info/choices
Google Analytics and Ads
Google’s use of the DART cookie enables it to serve ads to visitors based on their visit to sites they visit on the Internet.
To opt out of Google Analytics, you can use Google’s opt-out tool
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
See what data we have about you, if any.
Change/correct any data we have about you.
Have us delete any data we have about you.
Express any concern you have about our use of your data.
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
Wherever we collect sensitive information, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for “https” at the beginning of the address of the Web page.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.