1. INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes only your email, which you submit to us through the contact form and newsletter sign up process at the Site.
Information collected via Technology
To improve the quality of the website, we track information provided to us by your browser or by our software application when you view or use the website, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you. We track this information using cookies, or small text files, which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored in the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis.
The Company may use both persistent and session cookies: persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser.
Information you provide us by registering for submitting a request
2. HOW WE USE AND SHARE INFORMATION
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to respond to a user’s questions, solicit feedback from users, provide technical support, and inform users about promotional offers.
3. HOW WE PROTECT INFORMATION
We protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to undertake these risks.
4. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
5. LINKS TO OTHER WEBSITES
7. CONTACT US