Privacy Policy

Privacy Policy

This privacy policy has been accumulated to better serve those who are concerned with how their ‘Personally identifiable information’ (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

WHAT INFORMATION WE COLLECT FROM THE PEOPLE THAT VISIT OUR WEBSITE OR COMMUNICATE OVER EMAIL?

When ordering or registering on our site or over email, as appropriate, you may be asked to provide your name, email address, phone number, mailing address or more details to help you with your experience.

WHEN WE COLLECT YOUR INFORMATION?

We collect your personal information when you register on our company website, place an order or enter information on our site.

HOW WE USE YOUR INFORMATION?

We may use the information that collects from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

  • To personalize user’s experience and to allow us to deliver the type of content and product offerings in which you are most interested.
  • To allow us to better serve you in responding to your service requests for your business.
  • To manage a competition, promotion, survey or other site feature.
  • To quickly process your transactions.
  • To send periodic emails regarding your order or other products and services.

HOW WE PROTECT YOUR INFORMATION?

Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.

We use regular Malware Scanning.

We do not use an SSL certificate, we only provide articles and information, we never ask for personal or private information like email addresses, or credit card numbers.

DO WE USE ‘COOKIES’?

Yes, we use cookies. Cookies are small files that a website or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the website’s or service provider’s systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current website activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and website interaction so that we can offer better website experiences and tools in the future.

WE USE COOKIES TO:

Understand and save user’s preferences for future visits.

You can prefer to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser’s Help menu to learn the correct way to adjust your cookies.

If you disable cookies off, some features will be disabled. It won’t affect the users’ experience that makes your website experience more efficient and some of our services will not function properly. However, you can still place orders.

THIRD PARTY DISCLOSURE

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide you with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our website policies, or protect ours or others’ rights, property, or safety.

However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

THIRD PARTY LINKS

We do not include or offer third party products or services on our website.

GOOGLE

Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en

Now we have not enabled Google AdSense on our site but we may do so in the future.

2011 INDIAN PRIVACY LAW:

On April 11, 2011, India’s Ministry of Communications and Information Technology notified the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 under the Information Technology Act, 2000.

ACCORDING TO 2011 INDIAN PRIVACY LAW, WE AGREE TO THE FOLLOWING:

Sensitive Personal Information: The law relates to dealing with information generally, personal information and “sensitive personal data or information” (“hereinafter, SPD”). SPD is defined to cover the following: (a) passwords, (b) financial information such as bank account or credit card or debit card or other payment instrument details; (c) physical, physiological and mental health condition; (d) sexual orientation; (e) medical records and history; and (f) bio-metric information. It may be noted that SPD deals only with information of individuals and not information of businesses.

Privacy Policy: Every business is required to have a privacy policy, to be published on its website. The business has to also appoint a Grievance Officer. The privacy policy appears to be required whether or not the business deals with SPD. The privacy policy must describe what information is collected, the purpose of use of the information, to whom or how the information might be disclosed and the reasonable security practices followed to safeguard the information.

Consent for Collection: A business cannot collect SPD unless it obtains the prior consent of the provider of the information. The consent has to be provided by letter, fax or email. The business must also, prior to collecting the information, give the option to the provider of the information to not provide such information. In such case, the business can cease providing goods and services for which the information is sought.

Notification: The business should ensure that the provider of the information is aware that the information is being collected, the purpose of use of the information, the recipients of the information and the name and address of the agency collecting the information. Prior consent is required for disclosure of the information to any party other than the government.

Use and Retention: The business can use personal information only for the purpose for which it was collected. Also, the business cannot retain the SPD for longer than is required for the purposes for which the information may lawfully be used or is otherwise required under any other law.

Right of Access, Correction, and Withdrawal: The business should permit the provider of the information the right to review that information and should ensure that any information found to be inaccurate or deficient be corrected. The provider of the information also has the right to withdraw its consent to the collection and use of the information.

Transnational Transfer: A business can only transfer the SPD or information to a party overseas if the overseas party ensures the same level of protection provided for under the Indian rules. Further, the information can be transferred only if it is necessary for the performance of a lawful contract between the body corporate and the information provider or where the information provider has provided his consent to such transfer.

Security Procedures: The IT Act requires reasonable security procedures to be maintained in order to escape liability (see above). The rules appear to state that reasonable security procedures would be either (a) the IS/ISO/IEC 27001 on “Information Technology – Security Techniques – Information Security Management System – Requirements; or (b) a code developed by an industry association and approved and notified by the government. The security procedure has to be audited on a regular basis by an independent auditor, who has been approved by the Government of India. Such audit should be carried out at least once a year or as and when the body corporate has undertaken a significant up gradation of its computer resource.

HOW DOES OUR WEBSITE HANDLE DO NOT TRACK SIGNALS?

We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

THIRD PARTY BEHAVIORAL TRACKING?

It’s also important to note that our website does not allow third party behavioral tracking.

COPPA (CHILDREN ONLINE PRIVACY PROTECTION ACT)

When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.

We do not specifically market to children under the age of 13.

FAIR INFORMATION PRACTICES

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

IN ORDER TO BE IN LINE WITH FAIR INFORMATION PRACTICES WE WILL TAKE THE FOLLOWING RESPONSIVE ACTION, SHOULD A DATA BREACH OCCUR:

We will notify the users via email Within 7 business days.

We will notify the users via in site notification Within 7 business days.

We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only those individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.

CAN SPAM ACT

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

WE COLLECT YOUR EMAIL ADDRESS IN ORDER TO:

  • Send information, respond to inquiries, and/or other requests or questions.
  • Process orders and to send information and updates pertaining to orders
  • We may also send you additional information related to your product and/or service.

TO BE IN ACCORDANCE WITH CANSPAM WE AGREE TO THE FOLLOWING:

  • NOT use false, or misleading subjects or email addresses
  • Identify the message as an advertisement in some reasonable way
  • Include the physical address of our business or site headquarters
  • Monitor third party email marketing services for compliance, if one is used.
  • Honor opt-out/unsubscribe requests quickly
  • Allow users to unsubscribe by using the link at the bottom of each email

IF AT ANY TIME YOU WOULD LIKE TO UNSUBSCRIBE FROM RECEIVING FUTURE EMAILS, YOU CAN EMAIL US AT

support@techtss.com and we will promptly remove you from ALL correspondence.

CONTACTING US

If there are any questions regarding this privacy policy you may contact us using the information below.

www.techtss.com
DL-16 VSS Nagar, Vani Bihar, Bhubaneswar,
Odisha, 751007, India
support@techtss.com
US:- +1 (505) 349-5797
WhatsApp:- +91-9776995797