Privacy Policy

PLEASE READ THE FOLLOWING PRIVACY POLICY CAREFULLY. WHEN YOU USE OUR WEBSITE YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THIS PRIVACY POLICY.

Adhvan Corporation PRIVACY POLICY

This Privacy Policy will apply to the website that you are visiting, www.adhvan.com (the “Website”), which is owned by Adhvan Corporation (the “Company”).

Company and its subsidiary companies respect the privacy rights of our online visitors and recognize the importance of protecting the information collected from you. We have adopted a corporate wide Privacy Policy that guides how we collect, store and use the information you provide online.  Please note that this policy applies only to sites maintained by Company and its subsidiaries, and not to websites maintained by other companies or organizations to which we link.

If you have questions or concerns regarding this statement, you should first contact Company at the email address or postal address specified on the Website.

INFORMATION COLLECTION AND USE

Our primary goal in collecting personally identifiable information is to provide you with the products and services made available through the Website, including, but not limited to our services, to communicate with you, and to manage your registered user account, if you have one.

Information Collected Upon Registration: If you desire to have access to certain restricted sections of the Website, you will be required to become a registered user, and to submit certain personally identifiable information to Company. This happens in a number of instances, such as when you sign up for our services, or if you desire to receive marketing materials and information. Personally identifiable information that we may collect in such instances may include your full name, username, password, email address, address, time zone, telephone number, credit card number, marital status, gender, and other information that you decide to provide us with, or that you decide to include in your public profile.

Use of Contact Information: In addition, we may use your contact information to market to you, and provide you with information about, our products and services, including but not limited to our services. If you decide at any time that you no longer wish to receive such information or communications from us, please follow the unsubscribe instructions provided in any of the communications.

Information Security: Service Provider represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Information does and will comply with all applicable federal [and], state, [and foreign] privacy and data protection laws, as well as all other applicable regulations and directives.

(a) In recognition of the foregoing, Service Provider agrees and covenants that it shall:

(i) keep and maintain all Personal Information in strict confidence, using such degree of care as is appropriate to avoid unauthorized access, use or disclosure;

(ii) use and disclose Personal Information solely and exclusively for the purposes for which the Personal Information, or access to it, is provided pursuant to the terms and conditions of this Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Information for Service Provider’s own purposes or for the benefit of anyone other than Customer, in each case, without Customer’s prior written consent; and

(iii) not, directly or indirectly, disclose Personal Information to any person other than [its Authorized Employees/Authorized Persons][, including any,] [subcontractors,] [agents,] [outsourcers] [or] [auditors] (an “Unauthorized Third Party”), without express written consent from Customer [unless and to the extent required by Government Authorities or as otherwise, to the extent expressly required, by applicable law [, in which case, Service Provider shall (i) [use best efforts to] notify Customer before such disclosure or as soon thereafter as reasonably possible]; (ii) be responsible for and remain liable to Customer for the actions and omissions of such Unauthorized Third Party concerning the treatment of such Personal Information as if they were Service Provider’s own actions and omissions; and (iii) require the Unauthorized Third Party that has access to Personal Information to execute a written agreement agreeing to comply with the terms and conditions of this Agreement [relating to the treatment of Personal Information]]

Log Data: We will not collect Log Data from users. Log Data includes information such as the user’s domain, browser, and IP address. We respect the privacy of users and will not collect such information.

Your Account: If you use this site, you are responsible for maintaining the confidentiality of your account and password and for restricting access to your computer, and you agree to accept responsibility for all activities that occur under your account or password. Company reserves the right to refuse service, terminate accounts, remove or edit content, or cancel orders in their sole discretion.

Other Technologies: Other technologies used include clear GIFs. Clear GIFs also known as web bugs, beacons or tags, are small graphic images placed on a web page, web-based document, or in an e-mail message. Clear GIFs are invisible to the user because they are typically very small (only 1-by-1 pixel) and the same color as the background of the web page, document or e-mail message. We do not use clear GIFs to collect personal information about you. However, we may use clear GIFs to capture statistical usage information for our web pages, features or other elements on a web page. We may correlate this information to a user to personalize user experience and for statistical analysis of user experiences on our web pages.

Law Enforcement: We cooperate with government and law enforcement officials or private parties to enforce and comply with the law. We may disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims, legal process (including subpoenas), to protect the property and rights of Company or a third party, the safety of the public or any person, to prevent or stop any illegal, unethical, or legally actionable activity, or to comply with the law.

Business Transfers: We may sell, transfer or otherwise share some or all of its assets, including your personally identifiable information, in connection with a merger, acquisition, reorganization or sale of assets or in the event of bankruptcy. You will have the opportunity to opt out of any such transfer if the new entity’s planned processing of your information differs materially from that set forth in this Privacy Policy.