User access to online materials
Get in touch process or contact us process
Payment through payment gateway
E-mail information: You agree and acknowledge that when we receive e-mails from you, we may retain the content of any e-mail messages sent to us, as well as details of your e-mail address. You further agree and acknowledge that we shall use your email id and mobile number information for sending promotional/informational messages.
Data for analytics: We collect small amounts of information/data contained in your device for data analytics. Data analytics help us track your navigation so that we can tailor our offerings to your specific needs. Therefore, you agree and acknowledge that you have given us permission to access below given data. The kind of information that may be stored on our data analytics includes registration data so that a user does not need to re-enter the information every time he/she visits a particular area, user IP address, user ISP details, user browser, devices OS details. You allow us, agree and acknowledge for aforesaid data gathering and analytics so as that we may give you personalized offerings to your specific needs.
Once you are registered at the our site, you will have the option at any stage to inform us that you no longer wish to receive future services, e-mails and you may “unsubscribe” by sending unsubscribe request on email@example.com
Further, as per Rule 5(7) of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 of Information Technology Act, 2000 amended through Information Technology Amendment Act, 2008, you have an option to withdraw your consent for use of your sensitive personal data given earlier to us. Such withdrawal of consent shall be sent in writing to our registered address.
Reasonable Security Practices As per I.T. Act, 2000 and its Rules
We have implemented reasonable security practices as per Rule 8 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 of Information Technology Act, 2000 amended through Information Technology Amendment Act, 2008.
We have implemented stringent, internationally acceptable standards of technology, managerial security, technical security, operational security and physical security in order to protect your personally identifiable information from loss, misuse, disclosure, alteration or destruction. The data resides behind a firewall, with access restricted to our authorized personnel’s only.
We have implemented “Reasonable Security Practices” as required by the Information Technology Act, 2000 rules including any amendment in the said Act and its rules. By complying with such provisions, We assure you proper care and control over our I.T. and Security operations as required under relevant sections mainly section 43, 43A, 45, 66,72A & 85 of I.T. Act, 2000 and I.T.A.A, 2008 including related rules and therefore you agree that we shall not be held responsible for any fraudulent/criminal activity with regards to your sensitive personal information stored on our website.
By using this website you agree that we shall not be held responsible for any uncontrollable security attacks and in such cases you agree that we shall not be held responsible for any type of financial losses, loss of opportunity, legal cost, attorney’s fees, business losses, reputation loss, direct and indirect losses that may occur to you as per the Provisions of Section 43, 43A and 45 of Information Technology Act, 2000 including any amendments in the said Act and any other laws of India for the time being in force.
You further agree that our management shall not be held responsible directly or indirectly for any cyber crime related criminal liabilities under I.T. Act, 2000 relating to your information as you have agreed and acknowledged that our management complies with due diligence (care & controls) requirements of I.T. Act, 2000 including its rules and amendments.
Our security controls include but not limited to following:
- Cyberoam Firewalls
- Quick heal Antivirus
- 24 x 7 camera surveillance
- Cyber Law & Security Compliance intimation letters to our team
- Cyber Law & Security Awareness for our team
Further, you also agree and acknowledge that our management shall never be held responsible regarding privacy of your sensitive personal data in case of sharing your sensitive personal data to any authorized cyber investigation agency of appropriate government authorities as required under sections 67C, 69, 69A, 69B, 70B, 79 and 80 of I.T. Act, 2000 including its amendments and rules.
Grievance Redressal : If you have any questions or grievances regarding the privacy statement, practices of the site, or any other transaction issue, please contact our grievance officer on firstname.lastname@example.org
We have appointed our grievance officer as per Rule 5 (9) of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 of Information Technology Act, 2000 amended through Information Technology Amendment Act, 2008 and you can contact him on above given email id.