Collection of Information
We collect personally identifiable information, like names, postal addresses, email addresses, etc., when voluntarily submitted by our visitors. This information is only used to fulfill your specific request, unless you permit us to use it in another manner, for example, to add you to one of our mailing lists.
The Site may use cookie and tracking technology depending on the features offered. Cookie and tracking technology are useful for gathering information such as browser type and operating system, tracking the number of visitors to the Site, and understanding how visitors use the Site. Cookies can also help customize the Site for visitors. Personal information cannot be collected via cookies and other tracking technology, however, if you previously provided personally identifiable information, cookies may be tied to such information. Aggregate cookie and tracking information may be shared with third parties.
- When you use our eCommerce store, your cart and account details are saved to your computer.
- When filling out our contact form, a cookie shares data with us so we know where you’re visiting from.
- Cookies are used for analytic practices to help us understand our customers’ activities on our site.
You may disable the function of Cookies by choosing the browser’s configuration. Please note that this may result in you not being able to use all or part of the services on our site.
From time to time, we may send out emails for promotion purposes to announce our services, functions, research, news, promotions, contests, and events. Our customers may opt out of receiving these emails. We may use a third-party service provider to send out emails or to communicate smoothly with our customers. For smoother communication, we may share information, such as your email address, to the service provider for this limited purpose only.
Our Site uses ‘SSL’ to protect personal information. By using a browser that supports security functions, when you access our Site and enter personal information including your name and e-mail address, and this information is transferred to our server, the information is automatically encrypted when transmitted and received by servers. Therefore, if the transmitted data is intercepted by a third party, there is no need to worry about the content being stolen.
If you use a browser that does not support SSL, you may not be able to access our Site or input information.
Distribution of Information
We may share information with governmental agencies or other companies assisting us in fraud prevention or investigation. We may do so when: (1) permitted or required by law; or, (2) trying to protect against or prevent actual or potential fraud or unauthorized transactions; or, (3) investigating fraud which has already taken place. The information is not provided to these companies for marketing purposes.
Commitment to Data Security
Your personally identifiable information is kept secure. Only authorized employees, agents, and contractors (who have agreed to keep information secure and confidential) have access to this information. All emails and newsletters from this site allow you to opt out of further mailings.
Privacy Contact Information
We need you to review this important information. These are the terms you agree to upon ordering your account and/or services, and you will be held to them. There’s no fine print or tricks — we just want everything to be well communicated.
Adult content is strictly prohibited from servers. No adult content may be stored on, or served from our servers. Further, no files on our servers may contain links to adult content. Sixsense will be the sole discretionary in such matters.
Copyright Violation – Illegal Use
Violation of copyrights held by individuals and corporations or other entities can result in civil and criminal liability for the offending parties and can involve the ISP in litigation and possible loss of reputation. This includes, but is not limited to: copyrighted material; trademarks; trade secrets or other intellectual property rights used without proper authorization; material that is obscene, defamatory, constitutes an illegal threat, or violates export control laws.
Distribution of Internet Viruses, Worms, Trojan Horses, and Other Destructive Activities
Distribution of Internet viruses, worms, Trojan horses, and other destructive activities, such as hacking, can result in serious civil and or criminal liability under federal and state law.
Any attempts to undermine or cause harm to a Sixsense server or customer are strictly prohibited.
Any website that uses an unusually high amount of server resources (such as, but not limited to, CPU time, memory usage, and network resources over their allotted limits) will be given the option to either pay additional fees (which will depend on the resources required), reduce the resources used to an acceptable level, or upgrade its service to a Dedicated Server plan.
NON-PAYMENT / OVERDUE ACCOUNTS
Payment for hosting services is due on the first day of the beginning month of the subscription period and is renewed monthly or yearly (invoices are emailed approximately mid-month of the last month of the subscription period). Invoices are presented to clients via email notification (please make sure your email filters and spam blockers accept email from firstname.lastname@example.orgemail@example.com). Please notify us if your email address changes. Hosting account suspension or termination may occur without further notice after one month of any amount being overdue for any service provided by Sixsense. We want to keep your business, so we will attempt to remind you several times for a timely payment. Suspended accounts will be subject to a $250 reinstatement fee.
All products are custom-made to order and we therefore do not accept returns. Please ensure you have ordered the correct size by referring to the relevant sizing chart.
The right to be informed.
Individuals have the right to be informed about the collection and use of their data. This is a key transparency requirement under GDPR
The right of access.
Individuals have the right to access their personal data and supplementary information. The right of access allows individuals to be aware of and verify the lawfulness of the processing.
The right to rectification.
Individuals have the right to have inaccurate personal data rectified, or completed if it is incomplete. An individual can request rectification verbally or in writing. Organizations have one calendar month to respond to a request.
The right to erasure.
Individuals have the right to have personal data erased. This right is also known as “the right to be forgotten.” Individuals can make an erasure request verbally or in writing. Organizations have one calendar month to respond to a request. This right is not absolute and only applies in certain circumstances.
The right to restrict processing.
Individuals have the right to request the restriction or suppression of their data. When processing is restricted, organizations are permitted to store personal data, but not use it. Organizations have one calendar month to respond to a request. This right is not absolute and only applies in certain circumstances.
The right to data portability.
Individuals can obtain and reuse their data for their purposes across different services. This right allows individuals to move, copy, or transfer personal data easily from one IT environment to another safely and securely, without hindrance to usability. This right enables consumers to take advantage of applications and services that can use this data to find them a better deal or help them understand their spending habits.
The right to object.
Individuals have the right to object to:
- Data processing based on legitimate interests or the performance of a task in the public interest/exercise of official authority (including profiling);
- Direct marketing (including profiling);
- Data processing for the purpose of scientific/historical research and statistics.
Rights about automated decision and profiling.
This right protects individuals if organizations are carrying out solely automated decision-making that has legal or similarly significant effects on them.
SUBMIT A DATA RIGHTS REQUEST
By GDPR compliance, after you submit the request, you will obtain the following from the company you are requesting access from:
- Confirmation that your data is being processed;
- Access to your data; and,
- Other supplementary information.
This information will be provided to you without delay and at the latest within one month of the request receipt.
Write To Us:
Dharma Arcade, Raghunathpur, Bhubaneswar-751024