Privacy Policy


Privacy Policy

In the event that you require any more data or have any inquiries concerning our security strategy, kindly don’t hesitate to reach us by email at

At we believe the security of our guests to be critical. This security strategy report portrays in detail the sorts of individual data is gathered and recorded by and how we use it.

Log Files

In the same way as other Web destinations, utilizes log documents. These documents only logs guests to the site – generally a standard strategy for facilitating organizations and a piece of facilitating administrations’ investigation. The data inside the log documents incorporates web convention (IP) addresses, program type, Internet Service Provider (ISP), date/time stamp, alluding/leave pages, and conceivably the quantity of snaps. This data is utilized to break down patterns, regulate the site, track client’s development around the site, and accumulate segment data. IP locations, and other such data are not connected to any data that is actually recognizable.

Treats and Web Beacons utilizes treats to store data about guests’ inclinations, to record client explicit data on which pages the webpage guest gets to or visits, and to customize or tweak our site page content dependent on guests’ program type or other data that the guest sends by means of their program.

DoubleClick DART Cookie

→ Google, as an outsider merchant, utilizes treats to serve advertisements on

→ Google’s utilization of the DART treat empowers it to serve promotions to our webpage’s guests dependent on their visit to and different locales on the Internet.

→ Users may quit the utilization of the DART treat by visiting the Google promotion and substance network protection strategy at the accompanying URL –

Our Advertising Partners

A portion of our promoting accomplices may utilize treats and web guides on our webpage. Our promoting accomplices incorporate … .


While every one of these publicizing accomplices has their own Privacy Policy for their site, a refreshed and hyperlinked asset is looked after here.

You may counsel this inclining to discover the protection strategy for every one of the publicizing accomplices of

These outsider promotion workers or promotion networks use innovation in their individual commercials and connections that show up on and which are sent straightforwardly to your program. They naturally get your IP address when this happens. Different advances, (for example, treats, JavaScript, or Web Beacons) may likewise be utilized by our website’s outsider advertisement organizations to gauge the adequacy of their publicizing efforts and additionally to customize the promoting content that you see on the webpage. has no admittance to or power over these treats that are utilized by outsider promoters.

Outsider Privacy Policies

You should counsel the particular security strategies of these outsider promotion workers for more definite data on their practices just as for guidelines about how to quit certain practices.’s security strategy doesn’t make a difference to, and we can’t control the exercises of, such different publicists or sites.

On the off chance that you wish to impair treats, you may do as such through your individual program choices. More definite data about treat the executives with explicit internet browsers can be found at the programs’ particular sites.

Kids’ Information

We trust it is critical to give added security to kids on the web. We urge guardians and watchmen to invest energy online with their youngsters to watch, take an interest in and additionally screen and guide their online movement. doesn’t purposely gather any actually recognizable data from youngsters younger than 13. In the event that a parent or watchman accepts that has in its information base the by and by recognizable data of a kid younger than 13, kindly reach us quickly (utilizing the contact in the main section) and we will utilize our earnest attempts to expeditiously eliminate such data from our records.

Online Privacy Policy Only

This security strategy applies just to our online exercises and is legitimate for guests to our site and with respect to data shared as well as gathered there.

This strategy doesn’t make a difference to any data gathered disconnected or through channels other than this site.


By utilizing our site, you thus agree to our security strategy and consent to its terms.