Effective Date: 01/10/2024
At Velvet Recipes (www.velvetrecipes.com), we view your security in a serious way. This Security Strategy makes sense of how we gather, use, and safeguard your own data when you visit our site or communicate with our administrations.
1. Data We Gather
We might gather the accompanying kinds of data:
1.1 Individual Data:
At the point when you deliberately give it (e.g., when you buy into our pamphlet, remark on blog entries, or reach us), we might gather individual data, including:
Name
Email address
1.2 Naturally Gathered Data:
We naturally gather specific data when you visit our site, for example,
IP address
Program type and form
Pages visited
Time spent on the site
Alluding URLs
Treats and comparable following advancements
2. How We Utilize Your Data
We utilize the gathered data for the accompanying purposes:
To improve and keep up with our site and its usefulness.
To send you pamphlets, refreshes, and special substance assuming that you’ve bought in.
To answer remarks, questions, and requests.
To comprehend how clients interface with our site and further develop the client experience.
To follow legitimate prerequisites and safeguard the security of our site.
3. Treats and Following Advances
We use treats and comparative following advances to gather data about your connections with our site. This assists us with investigating web traffic, tweak content, and further develop client experience. You can adjust your program settings to decline treats, however this might influence the usefulness of the site.
4. Sharing of Data
We don’t sell, exchange, or offer your own data with outsiders, besides in the accompanying cases:
Specialist organizations: We might impart your data to believed outsider specialist organizations who assist us with working our site (e.g., email specialist co-ops).
Legitimate Prerequisites: We might uncover data whenever legally necessary, or on the other hand if important to safeguard our site, clients, or people in general.
5. Information Security
We go to proper lengths to shield your own data from unapproved access, modification, exposure, or obliteration. Be that as it may, no strategy for transmission over the web or electronic stockpiling is 100 percent secure. We endeavor to safeguard your own data yet can’t ensure outright security.
6. Outsider Connections
Our site might contain connections to outsider sites or administrations. We are not liable for the security practices or content of these outside locales. We urge you to audit the protection arrangements of any outsider sites you visit.
7. Your Privileges
You reserve the privilege to:
Access, update, or erase your own data that we hold.
Quit accepting our pamphlets or promoting correspondences by tapping the “withdraw” connect in the messages.
To practice these privileges, or on the other hand in the event that you have any worries about your security, kindly reach us at [email protected].
8. Youngsters’ Security
Our site isn’t normal for youths more youthful than 13. We don’t intentionally accumulate individual information from young people under 13. Assuming we become mindful that we have coincidentally gathered such data, we will do whatever it may take to erase it.
9. Changes to This Protection Strategy
We maintain whatever authority is needed to refresh this Security Strategy whenever. Any progressions will be posted on this page with an overhauled “Last Refreshed” date. We urge you to survey this Security Strategy occasionally to remain informed about how we safeguard your data.
10. Get in touch with Us
Assuming you have any different kinds of feedback with respect to this Security Strategy or the acts of Velvet Recipes, if it’s not too much trouble, reach us at [email protected]