Privacy Policy

At Tathya Sathi (accessible from www.tathyasathi.com), we are committed to protecting the privacy and security of our users’ personal information. This Privacy Policy document outlines the types of information that are collected and recorded by Tathya Sathi and how we use it.

1. Information We Collect

We collect both personal and non-personal information from our users:

Personal Information:

When you sign up for an account, subscribe to our newsletter, post an advertisement, or contact us, we may collect personal information such as:

  • Name
  • Email address
  • Phone number
  • Mailing address
  • Other relevant information necessary for our services

Non-Personal Information:

We also collect non-personal information automatically through cookies and tracking technologies. This includes:

  • IP address
  • Browser type and version
  • Device information (e.g., desktop, mobile)
  • Referring/exit pages
  • Date and time of visits

2. How We Use Your Information

The information we collect is used for the following purposes:

  • To provide, operate, and maintain our website
  • To improve, personalize, and expand our website
  • To understand and analyze how you use our website
  • To communicate with you, either directly or through our partners, for customer service, updates, and marketing
  • To process transactions (e.g., posting ads or subscribing to newsletters)
  • To prevent fraud and enhance security

We do not sell or share your personal information with third parties unless required by law or for essential services (e.g., processing payments).

3. Cookies and Tracking Technologies

Tathya Sathi uses cookies to enhance the user experience and track user behavior. Cookies are small files stored on your device by your web browser. These cookies help us:

  • Understand user preferences and optimize the website
  • Remember your login details for future sessions
  • Serve targeted advertisements based on your preferences

You can choose to disable cookies through your browser settings, but this may affect the functionality of certain features on our website.

4. Third-Party Services and Advertisements

We may use third-party service providers to facilitate certain aspects of our website:

  • Analytics: We use Google Analytics to track user behavior and improve website performance.
  • Advertisements: Third-party advertisers may collect information through cookies and other tracking technologies to display relevant ads. These third-party ad networks may use your IP address and other non-personal data for ad personalization.

We encourage you to review the privacy policies of these third-party providers.

5. Data Security

We take the security of your personal information seriously and employ various security measures to ensure that your data is protected against unauthorized access, alteration, disclosure, or destruction. These measures include:

  • Encryption: We use Secure Socket Layer (SSL) encryption technology to safeguard the transmission of personal data entered on our website.
  • Access Controls: We implement strict access controls to limit the number of individuals who can view and manage your personal information.
  • Regular Audits and Monitoring: Our systems are regularly audited for potential vulnerabilities, and we actively monitor our network for security threats.
  • Data Storage: Personal information is stored securely in our databases, with physical, technical, and administrative safeguards in place to protect data integrity.

Despite our efforts to protect your personal information, please be aware that no method of transmission over the Internet or electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your data, we cannot guarantee its absolute security. In the event of a data breach, we will notify affected users as required by law and take all necessary steps to mitigate the impact.

We encourage users to take their own security precautions as well, such as using strong passwords, updating software regularly, and being cautious of phishing attempts and other fraudulent activities.

 

Scroll to Top