This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally identifiable

information’ (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website ?

When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, Website or other details to help you with your experience.

When do we collect information?

We collect information from you when you subscribe to newsletter, fill out a form Comment or enter information on our site.

How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

• To personalize user’s experience and to allow us to deliver the type of content and product offerings in which you are most interested.
• To improve our website in order to better serve you.
• To allow us to better service you in responding to your customer service requests.

Secure Connection: The communications between user’s browser and the website as well as the data downloaded are encrypted through SSL certificate (HTTPS) to ensure absolute data security.

Terminated Employees: We always ensure that terminated employees no longer have access to systems/server that permit access to Confidential or Internal Use Only information.

Data Security Officer: A Data Security Officer works with Information Technology, to support the implementation and monitoring of security.

Scanning for Vulnerabilities– It is important to find any vulnerabilities in our infrastructure before hackers do. Since hackers will scan for vulnerabilities the minute they are discovered, a We have a routine in place for checking its own networks regularly.

Account Monitoring and Control – We always keep track of who is accessing what.