This Security Strategy sets out how we gather, use, and safeguard the individual data of guests to our internet business site.
Data Gathered
We might gather the accompanying data from guests to our site:
Name, email address, phone number, and other contact data
Transportation and charging address
Installment data, for example, charge card number and lapse date
Buy history and other exchange subtleties
IP address and other specialized data about the gadget used to get to our site
Data intentionally gave through reviews, advancements, or different structures
Utilization of Data
We utilize the data gathered to:
Process requests and installments
Convey items and administrations
Speak with clients about orders, advancements, and different issues
Work on our items and administrations
Safeguard against false movement and other security issues
Conform to legitimate commitments
Sharing of Data
We don’t offer or lease individual data to outsiders. In any case, we might impart data to:
Specialist co-ops who help us with request satisfaction, installment handling, and different capabilities
Colleagues who offer corresponding items or administrations
Policing different specialists when legally necessary or to safeguard our freedoms
Security of Data
We go to sensible lengths to shield individual data from unapproved access, exposure, change, or annihilation. In any case, no security framework is 100 percent powerful, and we can’t ensure the security of data sent through our site.
Treats and Different Advancements
We use treats and different advancements to upgrade the client experience and track site utilization. Treats are little text records that are put away on the client’s gadget and permit us to perceive returning guests and customize content. Clients have some control over treat settings through their program inclinations.
Connections to Outsider Locales
Our site might contain connections to outsider locales, which have their own security arrangements. We are not answerable for the security practices or content of these destinations.
Updates to Protection Strategy
We might refresh this Protection Strategy now and again, and any progressions will be pondered our site. Clients are urged to occasionally survey the strategy.
Contact Data
In the event that you have any different kinds of feedback about this Protection Strategy, if it’s not too much trouble, get in touch with us
