Emeralds World takes its users’ privacy very seriously. We are committed to protect & safeguard all the data our system gathers of registered as well unregistered users (Visitors) when they visit our website “website link”.
Our main focus remains on providing our users world-class 360 degree marketing services while keeping their private information intact at all times. This privacy policy will allow our users and potential clients to understand that “Website link” is completely safe to explore.
Please be informed that our website “website link” at certain places contains links of other websites that have their own privacy policies. We aren’t in any way responsible for their privacy policies & practices. “Website Link” users are advised to acquaint themselves with our privacy policies as it collects personally identifiable information.
When you share your personal data with us, you are agreeing to the privacy policies set by the company, and are bound to follow it. If you don’t agree with our privacy policies, please don’t use our website.
This Privacy Policy covers the following points:
The Different Kinds of information collected by the website
Use & Disclosure of Personal Data
Staying or Opting Out
Security
1.The Different kinds of information collected by the website: anyone wanting to register at the “website link” is asked to give certain personally identifiable information. When he/she decides to share the information with the website, it becomes the property of “website link” and can thus be divulged to third parties as per the privacy policy. In case, you don’t want any particular services, you don’t have to register.
2. Use & Disclosure of Personal Data: (a)Using Data: We track users’ booking only to provide them helpful suggestions. We track users’ bookings to provide feedback for those who use any of our services. We monitor users’ behaviour to improve the website’s user flow. (B) Disclosing Data: “website link” will not sell or rent any personally identifiable information collected. However, personally identifiable information will only be shared voluntarily for the following reasons: Registration and other such optional data.
If you are only visiting our “website link”, we won’t collect your data except to the extent of cookies. If you wish to use any of the services given on the website, you will be asked to register. This registration form will have questions about your basic contact information such as email Id, phone number, address (to deliver services), social platforms data from LinkedIn, Facebook, Twitter etc.
From Service Providers we gather the following information:
Name of the business, address, email id, work timings, holidays, slogan, company turnover, Name of the Owner, manager name, Services provided, services costs, time taken, service category, description, phones, customers per slot, social links, booking slots availability.
The data from your email
Whenever we receive an email from a user, we save the entire content of the email as well as their email address. We use web based tracking mechanisms such as cookies.
Cookies:
Cookies save small amounts of visitor browser data that we can use to improve our website. Cookies that enable us to monitor your navigation, help us customise our services according to your needs. Cookies store information such as registration data so the users do not have to enter their information every time, they visit. 3rd parties, which can be accessed from our “website link” from links, click through or banner advertising, may also use the collected cookies. We do not hold responsibility for any 3rd party or how they use this data.
3. Staying or Opting out: “website link” gives you a clear choice between choosing to give us your personally identifiable information and to opt out.
At the time of registration, we ask you for your mailing address so that we can send you company updates, newsletters, and advertising mails. However, it is completely your choice to feed in your information. You can choose to opt out and not reveal your information in any way.
4. Security Practices under I.T Act, 2000 and Rules of I.T. Act 2000 (Updated as per Amendment in I.T. Act, 2008 and its guidelines)
“Website link” has put strict globally accepted standards of technology and operational security to prevent loss, misuse or alteration of any kind of personal identification information. All our data stay well protected behind a trusted firewall that can be accessed only by a select few authorised “website link” individuals. By complying with “Technology Act 2000”, “Website link” ensures it takes complete & absolute care and control of its I.T. and Security operations under sections 43. 43A and 45 of information Technology Act.
Furthermore, you agree that “website link” will not be held responsible for any kind of uncontrollable cyber/security attack. If such a thing is to happen, “Website link” will not be liable for any kind of financial, opportunity, legal, business, or reputational losses that may happen to you under the provisions of section 43, 43A and 45 of IT Act 2000 and including any amendments in the mentioned Act.
Additionally, you agree that the “website link” management or any team member shall not be held responsible in any direct or indirect way for any cyber crime related criminal liabilities under I.T. Act, 2000 concerning your information as you accept that the team of “website link” complies with the requirements of I.T. Act 2000.
Our Security Controls
Our entire site runs on the https protocol, with special features to prevent recent attacks such as BEAST, FREAK, renegotiation etc. It also helps disable inferior quality encryption protocols
Firewall in use at the internet gateway level
Firewall on the web and database servers
Cross Site Scripting prevention
Database injection protection
Regular updates to OS, Web and Database servers
Limited access to servers based on requirement
Sanity checks for all user submitted data
Usage of Virtual Private Servers on Linode
User data put in different tables to make sure limited access.
Passwords of Users’ accounts stored in bcrypt values known to be resistant to current known attacks
Automated Database backups
Maintaining proper activity logs
Only as much data stored as is needed.
Access controls implemented to obviate access of unauthorised data