<link rel="shortcut icon" href="https://giftedtoall.com/public/assets/frontend/img/main-header/Logo.svg" type="image/x-icon">
close

Home Privacy

Privacy Policy

1.        ACKNOWLEDGMENT

1.1      This Buyer Protection Policy is an electronic record in terms of The Information Technology Act, 2000 & 2008. The rules cited herewith are applicable and the amended provisions of electronic records in various statutes as amended by The Information Technology Act, 2000 & 2008.

1.2      Electronic Record of this Buyer Protection Policy has been generated by a computer system and does not require any Signature(s).

1.3      This Buyer Protection Policy has been published following the Provisions of Rule 3(1) of The Information Technology (Intermediaries Guidelines) Rules, 2011 that require publishing the ‘Sales Partner Agreement’ web page for access or usage of the www.GiftedToAll.com online store.

2.        PENALTIES IN LAW

2.1      TAMPERING WITH COMPUTER SOURCE DOCUMENT(S): Prison upto 3 (Three) years or fine up to Rs. 2,00,000/- (Rupees Two lakhs Only) orwith both.

2.2      HACKING WITH COMPUTER SYSTEM(S): Prison up to 3 (Three) years or fine up to Rs. 1,00,000/- (Rupees One lakh Only) or with both.

2.3      RECEIVING STOLEN COMPUTER DATA OR DEVICE(S): Prison up to 3 (Three) years or fine up to Rs. 1,00,000/- (Rupees One lakh Only) or with both.

2.4      PUBLISHING OBSCENE INFORMATION(s): Prison up to 2 (Two) years or fine up to Rs. 2,000/- (Rupees Two Thousand Only) or with both. In case of subsequent conviction, it may extend up to 5 (Five) years Imprisonment plus Rs. 2,000/- (Rupees Two Thousand Only) fine(Sec. 292 of IPC).

2.5      SENDING OFFENSIVE OR PUBLISHING FALSE INFORMATION(S):Prison up to 3 (Three) years or fine as specified by the Respective Court.

3.        DATA COME TO OUR WEBSITE

We, at GiftedToAllIndia Ltd. (hereinafter called as the GiftedToAll), put Privacy and Security always atFirst Priority to win Trust of our Visitors and Customers. We keep the followingsIntact Confidential.

3A       Data Provided by Users

3A.1   During the registration process, we often ask for some standard and reliable information. Although we never share those with third-party,services and/or commercial data buyers.

3A.2   We also collect various information from different categories of users to provide excellent services. For example, social networking account info, personal data to give multiple incentives, and registrations in various third-party services integrated with our e-commerce site.

3A.3   Users also provide us with images, photos, documents and files for different purposes. We also keep those data safe in our system and server/cloud services.

3B       Data Obtained During User-Journey

3B.1   Recently, AI-powered Chatbot and some traditional chat applications also gather user data in order to provide the next level of services and user experience.

3B.2   In many instances, we provide opportunities to users to generate content on the site like comments, ratings, reviews, testimonials, suggestions, opinions and various incentivize contests. In such cases, users input some vital data.

3B.3   Our tracking software and various analytics programs often collect some essential information during the user journey on our website, which is vital in commercial applications. For instance, user preferences, user behaviour, time records of the presence/absence of users on our site and many more things.

3C       Data from Digital Voucher Partners

3C.1   During the accomplishment of the Sales Partnership process, we sought after several crucial pieces of information to meet legalities.

3C.2   Apart from these, Sales Partners also share their business information and contacts, which we keep secret.

3D      Transaction Data

3D.1   During the checkout process, we demand various inputs from the shoppers, including postal & shipping addresses, contact details and order ID. If the shoppers are repeat customers, we used to keep their buying history intact to reuse for our purposes, not to share with anyone.

3D.2   During the payment process, users have to go-through the financial data and may be prone to various vulnerabilities. Thereby, we also implement the best encryption technologies and obtain SSL certificates to ensure our users for safe and secure transactions.

3E       Financial Data

3E.1    During the checkout process, customers have to fill up sensitive information like credit/debit cards, bank details, financial account information/user credentials in banks and so on.

3E.2    Our effortsare to redirect users to trusted financial institutions' UIs, which saves us from keeping their financial data safe and secure on our server.

3F       User Personal Data/Info

We often collect personal information from our website visitors into different categories. e.g., name, address, gender, age, nationality and contact details (email, phone, & IMs' IDs) to provide them our services precisely. Moreover, laws of the land also compel us to keep user info with us to verify users on different occasions.

3G      Cookies

Our website places some tracking and data gathering code in your browsers in a text file that is cookies. It enables us to gather various technical and user information whenever you land on our site. Apart from device-related details, we also collect user preferences and usage history in due course. However, as per government rules, we sought user permission to accept our cookies.

4.         PRIVACY PROTECTION

We protect the privacy of our website users and their data at multiple levels.

4A       Secure Coding

We used the best programming technologies, frameworks, tools, and best programming practices to ensure secure code & database.

4B       Secure Integrations

We use selected third-partyservices and software with enough precautions and research on safety and security aspects to make our application highly secure and safe. Our programmers are the best lot for API integrations.

4C       Installation of Safety & Security Software

We invest a lot in the installation of safety and security software. For instance, anti-virus software, anti-spamming programs, scanning software, debugging software, anti-hacking system, encryption tools, SSL certificates and whatever the latest prevailing software to cope with various safety and security aspects.

4D      Best Security Practices

Our technical and general service team constantly monitors multiple fraudulent activities, including:

4D.1   Fake or imposter user profiles on our ecommerce site.

4D.2   Injecting code through comments and reviews like user input fields.

4D.3   User-generated content consists of promoting nudity, sexuality, racism, castes, communal and political hate speeches.

4D.4   Spamming emails and messages.

4D.5   Various hacking techniques.

We have enough arsenals to cope with such safety and security threats as well as vulnerability prevailing on the web. We prevent users with malicious intentions from entering our system and delete unwanted content immediately as well as taking legal actions against various malicious elements on the internet.

5.         CHANGES IN PRIVACY POLICY

5.1      We may update our Privacy Policy from time to time, whenever the needs arise.

5.2      We may or may not notify anyone's concerns about any changes whenever we post the new Privacy Policy on the current page.

5.3      We may inform you of privacy policy changes via email and/or a prominent notice on our Service, prior to the change becoming effective and update the ‘effective date’ at the top of the current Privacy Policy web page.

5.4      You are advised to review the Privacy Policy periodically for any changes.

5.5      Changes to our Privacy Policy become effective only when they are posted on the current page.

6          PRIVACIES OF MINOR

6.1      However, our Service does not address anyone under the age of 18 (Eighteen)i.e.Children/Minor.

6.2      Therefore, we never try to collect personally identifiable information from anyone under the age of 18 (Eighteen).

6.3      For the parents or guardians of the minors, we advise them that as soon as they get aware that their child has provided us with Personal Data, please contact us.

6.4      Once we become aware of unfortunate incidents, we shall take steps to remove that information from our servers.