Privacy Policy

Security Policy

Security Policy for

On the off chance that you require any more data or have any inquiries concerning our protection strategy, if you don’t mind don’t hesitate to get in touch with us by email at

At, the protection of our guests is critical to us. This security strategy archive diagrams the sorts of individual data is gotten and gathered by and how it is utilized.

Log Files

In the same way as other Web destinations, utilizes log documents. The data inside the log records incorporates web convention ( IP ) addresses, kind of program, Internet Service Provider ( ISP ), date/time stamp, alluding/leave pages, and various snaps to break down patterns, manage the website, track client’s development around the webpage, and assemble segment data. IP locations and other such data are not connected to any data that is by and by recognizable.

Treats and Web Beacons utilizes treats to store data about guests inclinations, record client explicit data on which pages the client access or visit, modify Web page content dependent on guests program type or other data that the guest sends by means of their program.

DoubleClick DART Cookie

.:: Google, as an outsider merchant, utilizes treats to serve promotions on

.:: Google’s utilization of the DART treat empowers it to serve promotions to clients dependent on their visit to and different locales on the Internet.

.:: Users may quit the utilization of the DART treat by visiting the Google promotion and substance arrange security strategy at the accompanying URL –

A portion of our promoting accomplices may utilize treats and web signals on our website. Our promoting accomplices incorporate … .

Google Adsense

These outsider promotion servers or promotion systems use innovation to the commercials and connections that show up on send straightforwardly to your programs. They consequently get your IP address when this happens. Different advancements (, for example, treats, JavaScript, or Web Beacons ) may likewise be utilized by the outsider promotion systems to gauge the viability of their ads or potentially to customize the publicizing content that you see. has no entrance to or authority over these treats that are utilized by outsider promoters.

You should counsel the separate security arrangements of these outsider promotion servers for progressively itemized data on their practices just as for guidelines about how to quit certain practices.’s protection strategy doesn’t make a difference to, and we can’t control the exercises of, such different promoters or sites.

On the off chance that you wish to incapacitate treats, you may do as such through your individual program choices. Increasingly point by point data about treat the executives with explicit internet browsers can be found at the programs’ individual sites.

error: Content is protected !!