Skip to main content

Privacy policy

Privacy policy Privacy policy This privacy policy ("Policy") is a blog operator ("blog operator", "we", "us" or "our") has personally identifiable information ("personal information") ("user") Describes how to collect, protect and use it. , "You" or "Your" may provide the shafiqjutt blogspot.com Blog and its products or services (collectively "Blog" or "Service"). It also describes the choices available to you in connection with your use of your personal information and how you access and update this information. This policy does not apply to practices of companies that we do not own or control or to individuals who we do not employ or control. Automatic collection of information When you visit the blog, our servers automatically record the information your browser sent. This data may include information such as your device's IP address, browser type and version, operating system type and version, language preferences, or web pages visited before you visited the blog, pages visited blog, and duration. That page, information retrieved from our blog, access time and date and other statistics. Personal information collection You can visit our blog without disclosing who you or others can identify you as a specific and identifiable individual. However, if you want to use some blog features, you will be prompted to provide certain personal information, such as your name and email address. We receive and store all the information you intentionally provided to us when you fill out an online form on our blog. You may choose not to provide us with personal information, but you may not be able to use some of our blog's features. If you are not sure what information is required, please contact us. Use of Collected Information The information collected from you may be used to personalize your experience. Improve Blog Improve customer service and respond to customer inquiries and emails. Blog and service operations and operations The automatically collected information is used only to identify potential abuse cases and to establish statistical information about blog usage. This statistical information is not aggregated in a way that identifies a particular user on the system. Children's privacy We recognize the need to provide additional privacy in relation to the personal information we can collect from children, and we take many special precautions to protect the privacy of our children. We do not ask for personal information from them at any time. It is recommended that your child consult with their parents before submitting information to the blog. We believe that parents should participate in their children's online activities and suggest that parents do their best to provide a safe and friendly online environment for their children. Do not track the signal Some browsers have a built-in suppression feature that signals the blogs you visit that you don't want to track your online activity. Tracking is different from using or collecting information about your blog. To do this, tracking refers to the collection of personally identifiable information as consumers who use or visit blogs or online services move through other blogs over time. The way the browser communicates the Do Not Track signal is not yet constant. As a result, this blog is not yet set up to interpret or respond to Do Not Track signals that your browser communicates with. Nevertheless, as described in more detail throughout this policy, we limit your use and collection of your personal information. Advertising We can display online advertising and share aggregated and non-identifiable information about our customers collected through the registration process or through specific surveys and online surveys and promotions. Personally identifiable information about individual customers will not be shared with advertisers. In some cases, aggregated non-identifying information can be used to deliver personalized advertising to the intended audience. Link to another blog Our blog contains links to other blogs that we do not own or manage. We are not responsible for the privacy practices of these other blogs or third parties. We encourage you to read the privacy policy of any blog that you know when you leave our blog and can collect personal information. Information security We protect the information you provide to computer servers from unauthorized access, use or disclosure in a secure, uncontrolled environment. We maintain reasonable management, technical and physical protection measures to prevent unauthorized access, use, modification and disclosure of the control and storage of personal information. However, data transmission over the Internet or wireless networks can not be guaranteed. Therefore, while working to protect your privacy, you acknowledge that (i) there are security and privacy restrictions on the Internet that are beyond our control. (ii) The security, integrity and privacy of any information and data exchanged between you and our blog cannot be guaranteed. Data breach If we find that the security of our blog has been compromised or that your personal information has been disclosed to an unrelated third party as a result of external activity, including but not limited to security attacks or fraud, we will investigate and report Notice and cooperation with law enforcement agencies, as well as take reasonable and reasonable measures. In the case of data breaches, reasonable efforts will be made to notify affected individuals if there is a reasonable risk of harming the user due to a breach or if separate notice is required by law. When we do, we will post a notice on our blog, send you an email, and contact you by phone. Change and fix We may update this Privacy Policy from time to time in our sole discretion and will notify you of material changes to the way we handle personal information. When a change is made, a notice is posted on the main page of the blog. We may also notify you in other ways through the contact information you provide. The updated version of this Privacy Policy will be effective immediately upon posting the revised Privacy Policy unless otherwise stated. Your continued use of the Blog or the Services after the effective date of the revised Privacy Policy (or any other act specified at the time) will be deemed to agree to such changes. Accept this policy You acknowledge that you have read this Policy and agree to all its terms. By using the Blog or the Services, you agree to be bound by this policy. If you do not agree to be bound by the terms of this policy, you do not have permission to use or access the blog and its services. Contact Please contact us if you have any questions about this policy.

Comments

Popular posts from this blog

History of Google site and top 10 apps

History of Google site and  top 10 apps  Have a nice day dear student today I am telling you about History of    Google site and other Google site partner like     YouTube. YouTube is the partner of Google site. in this article I tell you Briefly about Google site and its other products like Google analytics, what is Google add ward , brief introduction of Google mail       tell you about Google express    and many other information     like how to make a Gmail or how to Gmail sign up new account .after this I tell you after complete your work or checking Google mail how to Gmail sign out. What is gcp ? And at the end of this article i tell you how to you    Google fiber speed test by using a technique. History of Google Site in short words Google was founded in 1998 by Larry Page and Sergey Bring while they were the Ph.D. students at Stanford University in California . Now a days It owner is information technology company it name is Alpha-Bet Google is the on

MS Office Microsoft excel 2010 Short Key Lecture

      MS Office  Microsoft excel 2010 Short Key Lecture                                              ms excel short key                                               most use able short key in ms excel Number 1 Dear today I tell you most use able important short keys witch used in Microsoft Excel daily work in office work   1- Ctrl+shift+! Used to applies the number format with two decimal places, thousands separator,   2- Ctrl+1 key used to display the format cells dialog box.  3- Ctrl +shift+ # key used to applies the date format with the day, month, and year.  4- Ctrl+shift+~key used to apples the General number format format.  5- Ctrl+shift+&key used to applies the outline border to selected cells.  6- Ctrl+Shift+^ key used to enters the current time.  7- Ctrl+shift +% key key used to Percentage format with no decimal place.  8- Ctlr +shift+[key used to unhides any hidden rows within the selection.  9- The short key unhide a columen is

Analog Digital Computer Education

computer education Dear student in this lacture or article I gave you short introduction about  computer technology,  types of computer and I inform you that when the first computer introduced in the world, highest storage of super computer in Pakistan which organization has large super computer in Pakistan,  computer education   and many more information about computer related after reading my this  central computer related  article you knows all information about computer related basic and advance information. After reading this article you should be able to maintain your   it computer  in computer lab or any other place. This image have bee taken from freepik for only educational                                    purpose this site  link  is that Definition of computer Word computer derived from Latin word “compute”witch mean to calculate. “Computer is an electronic machine” Computer can accept data process the data and give us information   Three types o