I. Data WE Collect
We gather “Non-Personal Information” and “Personal Information.” Non-Personal Details contains info that can not be employed to personally identify you, including anonymous usage data, common demographic information we may possibly collect, referring/exit pages and URLs, platform types, preferences you submit and preferences which can be generated determined by the data you submit and quantity of clicks. Individual Information includes only your email, which you submit to us through the registration procedure in the Site.
Info collected by means of Technologies
To activate the Service you do not require to submit any Private Info besides your email address. To utilize the Service thereafter, you don’t need to submit further Private Information. Even so, in an work to improve the high quality in the Service, we track info offered to us by your browser or by our computer software application if you view or make use of the Service, such as the website you came from (recognized because the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you. We track this information utilizing cookies, or tiny text files which contain an anonymous distinctive identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer difficult drive. Sending a cookie to a user’s browser enables us to collect Non-Personal information about that user and preserve a record of the user’s preferences when utilizing our services, each on a person and aggregate basis.
II. HOW WE USE AND SHARE Details
III. HOW WE Safeguard Details
We implement safety measures developed to defend your details from unauthorized access. Your account is protected by your account password and we urge you to take methods to maintain your personal information safe by not disclosing your password and by logging out of one’s account soon after each and every use. We additional shield your info from prospective security breaches by implementing specific technological safety measures like encryption, firewalls and secure socket layer technologies. Nonetheless, these measures usually do not assure that your details will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge which you understand and agree to assume these dangers.
IV. YOUR RIGHTS With regards to The use of YOUR Private Information
V. Hyperlinks TO OTHER Sites
VII. Speak to US