Privacy Policy   Disclaimer   About Us   Contact Us  

Back to  HOME    Menu

privacy policy

By Kaji Acharya On 20/05/2018

Protection Approach

Welcome to (the “Site”).We comprehend that protection online is critical to clients of our Website, particularly when directing business.This articulation represents our security arrangements as for those clients of the Webpage (“Guests”) who visit without executing business and Guests who enroll to execute business on the Webpage and make utilization of the different administrations offered by Android Host (all in all, “Administrations”) (“Approved Clients”).

“By and by Identifiable Data”

alludes to any data that recognizes or can be utilized to distinguish, contact, or find the individual to whom such data relates, including, yet not restricted to, name, address, telephone number, fax number, email address, money related profiles, government managed savings number, and Visa data. By and by Identifiable Data does exclude data that is gathered secretly (that is, without distinguishing proof of the individual client) or statistic data not associated with a recognized person.

What By and by Identifiable Data is gathered?

We may gather essential client profile data from the greater part of our Guests. We gather the accompanying extra data from our Approved Clients: the names, addresses, telephone numbers and email locations of Approved Clients, the nature and size of the business, and the nature and size of the publicizing stock that the Approved Client expects to buy or offer.

What associations are gathering the data?

Notwithstanding our immediate accumulation of data, our outsider administration merchants, (for example, Visa organizations, clearinghouses and banks) who may give such administrations as credit, protection, and escrow administrations may gather this data from our Guests and Approved Clients. We don’t control how these outsiders utilize such data, however we do request that they unveil how they utilize individual data gave to them from Guests and Approved Clients. A portion of these outsiders might be middle people that demonstration exclusively as connections in the dispersion chain, and don’t store, hold, or utilize the data given to them.

How does the Site utilize By and by Identifiable Data?

We utilize By and by Identifiable Data to redo the Site, to make suitable administration contributions, and to satisfy purchasing and offering demands on the Site. We may email Guests and Approved Clients about research or buy and offering openings on the Site or data identified with the topic of the Site. We may likewise utilize By and by Identifiable Data to contact Guests and Approved Clients because of particular request, or to give asked for data.

With whom may the data might be shared?

By and by Identifiable Data about Approved Clients might be imparted to other Approved Clients who wish to assess potential exchanges with other Approved Clients. We may share amassed data about our Guests, including the socioeconomics of our Guests and Approved Clients, with our associated offices and outsider merchants. We likewise offer the chance to “quit” of accepting data or being reached by us or by any office following up for our sake.

How is By and by Identifiable Data put away?

By and by Identifiable Data gathered by Android Host is safely put away and isn’t available to outsiders or representatives of Android Host aside from use as demonstrated previously.

What decisions are accessible to Guests with respect to accumulation, utilize and appropriation of the data?

Guests and Approved Clients may quit getting spontaneous data from or being reached by us or potentially our sellers and associated organizations by reacting to messages as trained, or by reaching us at

Are Treats Utilized on the Site?

Treats are utilized for an assortment of reasons. We utilize Treats to get data about the inclinations of our Guests and the administrations they select. We additionally utilize Treats for security purposes to ensure our Approved Clients. For instance, if an Approved Client is signed on and the site is unused for over 10 minutes, we will consequently log the Approved Client off.

How does Android Host utilize login data?

Android Host utilizes login data, including, yet not restricted to, IP locations, ISPs, and program writes, to break down patterns, regulate the Site, track a client’s development and utilize, and accumulate wide statistic data.

What accomplices or specialist organizations approach By and by Identifiable Data from Guests as well as Approved Clients on the Site?

Android Host has gone into and will keep on entering into associations and different affiliations with various vendors.Such merchants may approach certain By and by Identifiable Data on a need to know reason for assessing Approved Clients for benefit qualification. Our protection arrangement does not cover their gathering or utilization of this data. Divulgence of By and by Identifiable Data to consent to law. We will uncover Actually Identifiable Data keeping in mind the end goal to conform to a court request or subpoena or a demand from a law implementation office to discharge data. We will likewise unveil Actually Identifiable Data when sensibly important to ensure the security of our Guests and Approved Clients.

How does the Site keep Actually Identifiable Data secure?

The greater part of our representatives know about our security approach and practices. The By and by Identifiable Data of our Guests and Approved Clients is just open to a predetermined number of qualified workers who are given a secret key so as to access the data. We review our security frameworks and procedures all the time. Touchy data, for example, charge card numbers or government managed savings numbers, is ensured by encryption conventions, set up to secure data sent over the Web. While we take monetarily sensible measures to keep up a protected site, electronic interchanges and databases are liable to mistakes, altering and break-ins, and we can’t ensure or warrant that such occasions won’t happen and we won’t be obligated to Guests or Approved Clients for any such events.

By what means would visitors be able to remedy any errors in By and by Identifiable Data?

Guests and Approved Clients may get in touch with us to refresh By and by Identifiable Data about them or to redress any errors by messaging us at

Could a Guest erase or deactivate By and by Identifiable Data gathered by the Site?

We furnish Guests and Approved Clients with a component to erase/deactivate By and by Identifiable Data from the Site’s database by reaching . Notwithstanding, in view of reinforcements and records of erasures, it might be difficult to erase a Guest’s entrance without holding some lingering data. A person who solicitations to have By and by Identifiable Data deactivated will have this data practically erased, and we won’t offer, exchange, or utilize By and by Identifiable Data identifying with that person in any capacity pushing ahead.

What happens if the Security Arrangement Changes?

We will tell our Guests and Approved Clients about changes to our protection strategy by posting such changes on the Site. Notwithstanding, in the event that we are changing our security strategy in a way that may cause exposure of By and by Identifiable Data that a Guest or Approved Client has already asked for not be uncovered, we will contact such Guest or Approved Client to enable such Guest or Approved Client to avoid such divulgence.

Connections: contains connections to other sites. If you don’t mind take note of that when you tap on one of these connections, you are moving to another site. We urge you to peruse the protection explanations of these connected destinations as their security approaches may vary from our own

Leave a Comment

© copyright 2016-2023 | All rights reserved by Sajilo Sanjal Power by KAJI