privacy policy

This Privacy Policy applies to all of the products and services offered by us. If you have any questions about this Privacy Policy, please feel free to contact us through our website.

Information we collect and how we use it

We may collect the following types of information:

1) Information you provide : When you contact us.

2) Cookies : When you visit us, we send one or more cookies to your computer or other device. We use cookies to improve the quality of our service.

3) Log information : When you access our services via a browser, application or other client our servers automatically record certain information. These server logs may include information such as your web request, your interaction with a service, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser or your account.

4) User communications : When you send email or other communications to us, we may retain those communications in order to process your inquiries, respond to your requests and improve our services.

Information sharing

We will not share personal information with other companies or individuals outside of our company. We will share personal information only in the following limited circumstances:

1) We have your consent. We require opt-in consent for the sharing of any sensitive personal information.

2) We provide such information to our subsidiaries, affiliated companies or other trusted businesses or persons for the purpose of processing personal information on our behalf. We require that these parties agree to process such information based on our instructions and in compliance with this Privacy Policy and any other appropriate confidentiality and security measures.

Information security

We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.