ESC

What are you looking for?

Newsletter image
Weekly updates

Let's join our newsletter!

Do not worry we don't spam!



1. Collection of Contact Information

a. Types of Contact Information Collected

  • Explanation: The website collects various types of contact information during the registration and profile creation process. This includes:
  • Email Address: Used for account verification, communication, and notifications.
  • Mobile Number: Used for verification, security purposes, and communication.
  • Postal Address (Optional): Used for verifying identity and sending relevant documents if needed.

b. Purpose of Collection

  • Explanation: The primary purposes for collecting contact information include:
  • Account Verification: Ensuring the authenticity of users.
  • Communication: Facilitating communication between users and the website.
  • Security: Protecting accounts and preventing fraud.
  • Service Delivery: Enhancing user experience and providing customer support.

2. Use of Contact Information

a. Communication with Users

  • Explanation: The website uses contact information to communicate important updates, service notifications, and promotional offers. Users may receive emails or SMS messages regarding their account activity, subscription renewals, and security alerts.

b. User Interaction

  • Explanation: Contact information is used to facilitate interaction between users while protecting their privacy. For instance, initial contact may be made through in-platform messaging systems without revealing personal email addresses or phone numbers.

c. Customer Support

  • Explanation: Contact information is used by customer support to assist users with their queries, resolve issues, and provide technical support. Effective communication is essential for prompt and efficient customer service.

3. Privacy and Confidentiality

a. Protection of Personal Information

  • Explanation: The website is committed to protecting the privacy and confidentiality of user contact information. This includes implementing security measures to prevent unauthorized access, disclosure, or misuse of personal data.

b. No Sharing with Third Parties

  • Explanation: The website does not share user contact information with third parties without explicit consent, except as required by law. Users’ privacy is paramount, and information is shared only under strict confidentiality agreements and for legitimate purposes.

c. Anonymity and Pseudonymity

  • Explanation: Users can choose to remain anonymous or use pseudonyms while interacting on the platform. This helps protect their identity and contact information until they are comfortable sharing it with potential matches.

4. Verification of Contact Information

a. Email Verification

  • Explanation: Users are required to verify their email addresses during registration by clicking on a verification link sent to their inbox. Email verification ensures the authenticity of the user and the validity of the email address provided.

b. Mobile Number Verification

  • Explanation: Users may need to verify their mobile numbers via an OTP (One-Time Password) sent via SMS. Mobile verification adds an additional layer of security and helps in authenticating user identity.

5. Access and Control

a. Updating Contact Information

  • Explanation: Users can update their contact information through their account settings. This ensures that the website has the most current and accurate information for communication and security purposes.

b. Privacy Settings

  • Explanation: Users can control the visibility of their contact information through privacy settings in their profiles. They can choose who can see their contact information and how it is shared with other users.

c. Consent for Communication

  • Explanation: Users can provide or withdraw consent for receiving communications from the website, such as newsletters or promotional offers. This allows users to manage their communication preferences and reduce unwanted messages.

6. Security Measures

a. Encryption

  • Explanation: Contact information is protected using encryption technologies both during transmission and at rest. Encryption ensures that data is secure and cannot be accessed by unauthorized parties.

b. Access Controls

  • Explanation: Access to contact information is restricted to authorized personnel only. Strict access controls and authentication mechanisms are in place to prevent unauthorized access to user data.

c. Regular Security Audits

  • Explanation: The website conducts regular security audits to identify and address vulnerabilities. Security audits help maintain the integrity and security of contact information.

7. Data Retention and Deletion

a. Retention Period

  • Explanation: Contact information is retained for as long as necessary to fulfill the purposes for which it was collected or as required by law. Retention policies ensure that data is not kept longer than needed.

b. Account Deactivation and Deletion

  • Explanation: Users can deactivate or delete their accounts at any time. Upon deletion, all contact information is permanently removed from the website’s databases. Account deactivation or deletion helps users maintain control over their personal data.

8. Compliance with Legal Standards

a. Regulatory Compliance

  • Explanation: The website complies with applicable data protection and privacy laws, such as the Information Technology Act, 2000, and its related rules in India. Compliance with legal standards ensures that contact information is handled responsibly and ethically.

b. User Rights

  • Explanation: Users have the right to access, update, and delete their contact information. The website provides mechanisms for users to exercise these rights, ensuring transparency and control over personal data.

9. Breach Notification

a. Incident Response

  • Explanation: In the event of a data breach affecting contact information, the website will follow a predefined incident response plan. This includes identifying the breach, containing it, and mitigating any damage.

b. User Notifications

  • Explanation: Users will be promptly notified of any data breaches that compromise their contact information. Notifications will include details of the breach, the potential impact, and steps users can take to protect themselves.

10. Feedback and Improvements

a. User Feedback

  • Explanation: Users are encouraged to provide feedback on the contact information policy and its implementation. Feedback helps the website improve its policies and address any concerns users may have.

b. Continuous Improvement

  • Explanation: The website regularly reviews and updates its contact information policy to reflect changes in technology, legal requirements, and user expectations. Continuous improvement ensures that the policy remains effective and relevant.