We use information to operate the Services, including:
We may disclose all the aggregated information about our users without any restriction.We may disclose personal information that we collect, or you provide as described here:
may require us and our service providers to disclose your information if: (i) reasonably necessary to comply with a legal process, such as a court order, search warrant, government investigation or other legal requirements; or (ii) necessary for the prevention or detection of crime (subject in each case to applicable law).Take your consent or your request
We may ask for your consent to share your information with third parties. When we do, we will make clear why we want to share the information. We may collect and provide aggregate information about our Users (such as how many persons visited a particular page or activity or the likes and dislikes of our Users) to our advertisers, sponsors, promotional partners and affiliates but this aggregated information does not include personal information about any individual User.
Certain features of our Website may use locally stored objects (or Flash cookies) to collect and store information about your preferences and navigation to, from, and on our Website. Flash cookies are not managed by the same browser settings as are used for browser cookies.Web bugs in emails
Pages of the Website/marketing emails may contain small electronic files known as web beacons/web bugs (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or and for other related website statistics (for example, recording the popularity of certain website content and verifying system and server integrity).
Web bugs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of Web users. In contrast to cookies, which are stored on a user’s computer hard drive, web beacons/web bugs are embedded invisibly on Web pages or in emails and are about the size of the period at the end of this sentence. We use the web bugs in our HTML-based emails to let us know which emails have been opened by recipients. This allows us to gauge the effectiveness of certain communications and the effectiveness of our marketing campaigns. We tie the information gathered by the web bugs in emails directly with our customers’ Personal Information.
We may collect demographic information, such as your ZIP code, age, gender, preferences, interests, and favorites using log files that are not associated with your name or other personal information. There is also information about your computer hardware and software that is automatically collected by us. This information can include your IP address, browser type, domain names, internet service provider (ISP), and the files viewed on our site (e.g., HTML pages, graphics, etc.), operating system, click stream data, access times and referring website addresses.How we protect and retain information
We use physical, technical and organizational measures designed to protect your information against unauthorized access, theft and loss. We restrict access to your personal information to those employees who need to know that information to service your account or perform their job functions. We take precautions intended to help and protect information that we process as no system or electronic data transmission is completely secure. Any transmission of your personal data is at your own risk and we expect that you will use appropriate security measures to protect your personal information.
You are totally responsible for maintaining the security of your account and the information in your account. We may suspend your use of all or part of the Services without notice if we suspect or detect any breach of security. You understand and agree that we may deliver electronic notifications about breaches of security to the email address on record on your account.
In order to protect your personal data from misuse, loss and destruction, we have integrated various security parameters. We maintain security arrangements at various levels such as physical, organizational and technical security. Heuristic Communication Pvt.Ltd. carries security measures totally based on industry standards in order to help protect against public access. Only the team members or employees with specific authorization have the right to access users’ personal information.Data Security