Privacy Policy

Security Policy for https://tektot.com

On the off chance that you require any more data or have any inquiries regarding our security approach, it would be ideal if you don’t hesitate to get in touch with us by email at [email protected]

At tektot.com, the protection of our guests is of outrageous significance to us. This protection arrangement report plots the sorts of individual data is gotten and gathered by tektot.com and how it is utilized.

Log Files

In the same way as other Web locales, tektot.com makes utilization of log records.kind of program, Internet Service Provider ( ISP ), date/time stamp, alluding/leave pages, and number of snaps to break down patterns, control the webpage, track clients development around the website, and assemble statistic data.

Treats and Web Beacons

Tektot.com uses treats to store data about guests inclinations, record client explicit data on which pages the client access or visit, alter Web page content dependent on guests program type.

Accumulation of individual data

You can decide not to give us certain data, yet then you will most likely be unable to exploit a portion of the Website’s highlights. Clients who are questionable about what data is obligatory are free to reach us.

Accumulation of non-individual data

When you visit the Website our servers consequently record data that your program sends. This information may incorporate data, for example, your gadget’s IP address, program type and form, working framework type and form, language inclinations or the site page you were visiting before you went to our Website, pages of our Website that you visit, the time spent on those pages, data you look for on our Website, get to times and dates, and different insights.

Use and handling of gathered data

Non-Personal Information gathered is utilized just to recognize potential instances of maltreatment and build up factual data with respect to Website utilization. This factual data isn’t generally collected so that would recognize a specific client of the framework.

We may process Personal Information identified with you in the event that one of the accompanying applies:

(I) You have given their assent for at least one explicit purposes. Note that under a few enactments we might be permitted to process data until you article to such preparing (by quitting), without depending on assent or some other of the accompanying legitimate bases beneath. This, be that as it may, does not make a difference, at whatever point the preparing of Personal Information is liable to European information insurance law.

(ii) Provision of data is essential for the execution of a concurrence with you or potentially for any pre-legally binding commitments thereof.

(iii) Processing is vital for consistence with a legitimate commitment to which you are subject.

(iv) Processing is identified with an undertaking that is done in people in general intrigue or in the activity of authority specialist vested in us.

(v) Processing is important for the motivations behind the genuine interests sought after by us or by an outsider. Regardless, we will be glad to elucidate the particular legitimate premise that applies to the preparing, and specifically whether the arrangement of Personal Data is a statutory or legally binding prerequisite, or a prerequisite important to go into an agreement.

The privileges of clients

You may practice certain rights with respect to your data handled by us. Specifically, you have the directly to do the accompanying:

(I) You have the directly to pull back assent where you have recently given your agree to the handling of your data.

(ii) You have the directly to item to the preparing of your data if the handling is completed on a legitimate premise other than assent.

(iii) You have the directly to learn if data is being handled by us, acquire revelation with respect to specific parts of the preparing and get a duplicate of the data experiencing preparing.

(iv) You have the directly to check the exactness of your data and request it to be refreshed or adjusted.

(v) You have the right, in specific situations, to limit the handling of your data, in which case, we won’t process your data for any reason other than putting away it.

(vi) You have the right, in specific situations, to acquire the eradication of your Personal Information from us.

(vii) You have the directly to get your data in an organized, normally utilized and machine meaningful configuration and, if in fact attainable, to have it transmitted to another controller with no deterrent. This arrangement is pertinent given that your data is handled via robotized implies and that the preparing depends on your assent, on an agreement which you are a piece of or on pre-legally binding commitments thereof.

Promotion

We may show online commercials and we may share amassed and non-recognizing data about our clients that we gather through the enlistment procedure or through online overviews and advancements with specific sponsors. We don’t share by and by recognizable data about individual clients with sponsors. In a few cases, we may utilize this totaled and non-distinguishing data to convey custom fitted notices to the target group.