Skip to main content

Privacy Policy

Techboy.dev Privacy Policy
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website or app?

We do not collect information from visitors of our site.
or other details to help you with your experience.

When do we collect information?

We collect information from you when you respond to a survey or enter information on our site.

Provide us with feedback on our products or services 
How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
       To improve our website in order to better serve you.
       To administer a contest, promotion, survey or other site feature.

How do we protect visitor information?

We do not use vulnerability scanning and/or scanning to PCI standards.
We only provide articles and information. We never ask for personal or private information like email addresses or credit card numbers.
We do not use Malware Scanning.
We do not use an SSL certificate
       We only provide articles and information. We never ask for personal or private information like email addresses, or credit card numbers.

Do we use 'cookies'?

We do not use cookies for tracking purposes

You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.

If you disable cookies off, some features will be disabled that make your site experience more efficient and some of our services will not function properly.

However, you can still place orders .


Third-party disclosure

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when it's release is appropriate to comply with the law, enforce our site policies, or protect ours or others' rights, property, or safety.

However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

Third-party links

Occasionally, at our discretion, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.

Google

Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We have not enabled Google AdSense on our site but we may do so in the future.

COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We market to
We do not collect information from children under 13
children under 13.
No

In order to remove your child's information please contact the following personnel:

We adhere to the following COPPA tenants:
       Parents can review, delete, manage or refuse with whom their child's information is shared through contacting us directly.
or contacting us directly.

Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email
       Within 7 business days

We also agree to the Individual Redress Principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

CAN SPAM Act

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:

To be in accordance with CANSPAM we agree to the following:

If at any time you would like to unsubscribe from receiving future emails, you can email us at
and we will promptly remove you from ALL correspondence.

Contacting Us

If there are any questions regarding this privacy policy you may contact us using the information below.
Techboy.dev
5, jayprakash nagar
rajkot, gujarat 360003
india
sunilaaydi123@gmail.com

Last Edited on 2016-04-01

Comments

Popular posts from this blog

How to improove iphone battery life ?

Apple iPhone Battery: You may consider how this is possible if the battery truly contracted. Apple could be taking some masterful flexibility in its evaluations, yet what has likely happened is that the A9 chip and distinctive parts within the phone have ended up being more gainful, less wasteful, such that total power utilization of the phone is lower. From now on, Apple can convey the iPhone 6s with a more diminutive battery however continue offering the same power and battery bits of knowledge as the iPhone 6. Enhance Battery Life: Enhance iPhone battery life tips do you complete a strong and which don’t, you should from your penchants and slants subordinate. Not each tip is useful for everyone. Create iPhone battery life: To create iPhone battery life ignored these essential and effective tips: 1. WiFi and GPS, is one of the greatest imperativeness customers on the iPhone. So just on WiFi and GPS when required. This extras imperativeness and also entrancing for s...

How to remove shortcut virus

how to remove shortcut virus easily with few simple methods..  here we are descusing about shortcut virus which is very irritating for all of us. when you insert your pendrive or any portable storage device the files into the device becomes one shortcut which is called as shortcut virus here i will tell you how you can remove this virus form your computer easily.. #1 Remove virus from cmd here we will use command prompt to remove shortcut virus from your device easily..   1.insert your infected device into computer   2.DONOT open infected pendrive or device just insert it into the usb slot   3.open command prompt as administrator   4.input this code:        attrib -h -r -s /s /d D:\*.*   5.in this code replace latter D with your specific pendrive name or drive latter at last of the code line   and press enter and your shortcut virus will be removed but there will be sevral diffrent system files ...

Create One-Click Shutdown and Reboot Shortcuts

Create One-Click Shutdown and Reboot Shortcuts First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC. But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this: shutdown -r -t 01 -c "Rebooting your PC" Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use. I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use: shutdown -s -t 03 -c ...