Third-party vendors: Dishyhealth.com is in lined with advertising policies, which serves as a third party vendor. It is noted that third party vendors are allowed to place their ads. Google as a third party vendor is allowed to place cookies to serve their ads. Google’s part of advertising terms, DART cookies are also enabled to show the ads to website’s users based on their preferences. Apart from Google, any third party vendor may be allowed to expose the visitors with ads. It is acknowledged that Dishyhealth.com is not able to control the activities of advertisers.
Collection of user data: Dishyhealth.com may collect user data when we are approached for queries, subscribed to newsletters, promotional e-mails, etc. However, the user can opt-out of any of the above by clicking opt-out option in the mail or by sending a mail to the admin.
Dishyhealth.com reserves the right to send mails to its users regarding management of site.
Dishyhealth.com may use non-personally- identifiable information collected by the users to make a report to show trends and preferences of audience.
Information Retention: We have the right to retain user’s information for as much time as we intend to. We keep this information to us for as long as we believe it’s valuable and useful. Nonetheless, we also dispose the information without any prior notice to the users.
Transfer of Business assets: As we grow and expand, we may sell or acquire assets, indulge in mergers or transfers. In any of the case above, customer’s information is a part of business asset hence; it is passed on to the subsequent purchaser. The customer information is also subject to transfer in case of selling the entire website to the purchaser.
Security Measures: We take appropriate security measures to protect the information of our visitors. We also apply reasonable security measures to protect the website from unauthorized access, database management and data security. However, our strong measures still does not guarantee full proof security owing to the advance technology and encryption systems. Any irrelevant individual may attempt to commit crimes intentionally. Due to this, we cannot guarantee absolute security to anyone. Still, our system keeps on improving performance and minimizing vulnerabilities.