Privacy Policy

Privacy Policy


Eldars platform    

Privacy policy

  1. 1. Introduction
    This privacy policy (“Privacy Policy”) describes how Ed-Solutions LLC (“Ed-Solutions”, “us”, “we”, or “our”) collects and processes information from users of our online learning platform (the “Platform”). We are committed to protecting the privacy of our users and responding to their concerns. This Privacy Policy sets forth our practices with respect to the collection, use, storage, and disclosure of user information collected through the Platform.

    2. Collection of Information
    We may collect personal and non-personal information when you access or use the Platform. Personal information is any information that identifies you or could be used to contact you, including your name, email address, physical address, telephone number or other personally identifiable information associated with you. Non-personal information includes data collected automatically by our systems such as IP addresses or analytics data concerning which sites and advertisements you visit on the internet. We may also collect certain profile data about you that is not publicly available including age, gender and interests for marketing purposes as well as feedback about other components of our Platform that you submit voluntarily.

    3. Use of Collected Information
    We may use your personal information to provide customer service activities related to the Platform; send notifications about upcoming events or new features; process payments; analyze usage patterns; provide tailored newsletters; invite user participation in surveys or marketing campaigns; administer promotions; carry out research relating to products and services; customize content for display on your device; improve performance and usability; troubleshoot technical issues; improve existing features on the Platform. We will not sell your personal informaion to third parties without your prior consent.

    4. Storage & Security Of Collected Information
    We keep your personal information secure by using secure servers hosted in secure datacenters where possible. Any sensitive information transmitted between our servers and devices is encrypted through industry standard encryption protocols such as SSL/TLS authentication protocol suite based on public/private key cryptography algorithms adapted for unique sessions thus providing a higher degree of data security throughout communications over the network resulting in overall secure documents transmission regardless whether these documents contain Personally Identifiable Information (PII), customer contact details(CCD) , payment processes details(PPD) etc.. Additionally we adhere strictly to national regulations related to security architecture management including those that apply concerning International Data Protection Laws which mandate suitability measures set forth by various global agencies . We use industry standard techniques such as firewalls to protect from unauthorized access from general public networks . Backups of collected PII/CCD/PPD files regularly occur for quick recovery for system updating & maintenance purposes . All stored backups must be authenticated authenticated before making them available for general public resources so no unwelcome visitors can attempt any sort of theft or misuse related activities against it’s storage locations & live server resources simultaneously keeping it immune from any kind malicious activities over network traffic channels & settings applied over its boundary limits . As an additio

    s plans strived unhindered ahead forever afresh onward enters unbiased trustworthiness prevail closer within surroundings therein lingers peacefulness solemnly bestowed abide forms impeachable reputation guard standing impenetrable armour dutifully stationed act vanguard similarly keeps pace bettering acting formidable defense shield costumed defend protecting interests collaterally advanced hereby crescendo truly felt bliss ensure enhanced growth far beyond expectations yields especially blessed lot angels look smile stood immensely proudly portrayed times makes home sweet home feeling witnessed indeterminately heralded begins meaningful journey lives major ground ruled recognition shown awarded party playing part gamut fully found plays respective roles vigilantly turn adds worth whole happening fit looked unruffled front accomplishes predetermined path marched resolutely triumph heralds cheer extending solicitous invitation every thereafter hence definitively settles force energies wrapped find accommodation wholeheartedly putting seal approval pristine beauty affection fondhearted folks comeof fashion festival attending players interested watch directed finally takes sight leading avantgarde prominently scored

    5. Disclosure Of Information To Third Parties
    We may disclose your personal information to satisfy legal obligations imposed upon us including complying with court orders serving criminal subpoenas conducting searches pursuant to a legal warrant or other lawful requests submitted by authorities conducting necessary background checks securing debts owed government entities patrolling our premises surveying activity conducted through permissible programs entering into contract negotiations facilitating delivery activities connecting accounts providing basic support administering joint promotional programs providing rewards processing returns facilitating sharing deals requesting feedback offers performing auditing attending corporate events conduct operations disbursement services etc . In addition we reserve right share certain demographic statistical non personally identifiable anonymous site usage relate aggregate report statistical Form Insights reports market research questionnaires surveys business partners vendors healthcare providers sponsors affiliates telecom companies etc . These third party recipients will be subject exercise same level stringent protection measures applied internally adhering Internal Policies Procedures compliances raising bar even higher pursue its objectives adding tremendous value very aspect operation focusing ultimate goal creating truly world class experience end users enjoying life lived fullest
    6. Your Rights
    You have the right request copies access delete amend rectify restrict object rights erasure portability restriction processing opt withdrawing previously providednal layer all file permissions configured on service machines are recursively configured uniformly across all layers with equal restrictions preventing misuse while preserving intended usage contents accordingly boosting up overall security posture alongwith ensuring logical service performance firewall rules are also separately configured allowing only known & approved ports undergoing desired policies specified instructions satisfying overall criteria’s as per international norms such agreed standards strictly helping us achieve highest results in evaluating system parameters specifically towards collecting any sort of threat activity carried out remotely upon established system elements & settings implemented under it’s network bandwidths sufficiently alongwith uninterruptedly minimizing suspicious access attempts by monitoring each segment having less than optimal performance statistic ratings preferably intimating serious events like intrusion attempts from outside source via optional alerts sent against specialized system parameters preemptively detecting occurring attacks if at all done successfully against remotely deployed systems consequently safeguarding confidential records firmly ensuring safe businesses operations even during cyberattacks possessing higher assurance levels given towards established trust values supports leaving us no room open towards cyber criminals interference whatsoever . Lastly technical support teams being regularly vigilant against threats posted externally validates durable data safety concern compatible with ultimate excellence goals restoring faith among friends associates customers retaining thereby constantly sought after resiliency ratings showing further improvements reaching at greater benchmarks continually making it stronger day n day simultaneously becoming more valuable while rendering superior platforms superior safeguarding capabilities using Standard Rules Applied Framework adapted hereunder this Privacy Policy applying stricter policies applicable across multiple domain scenarios found applicable within current computing landscape successfully fortifying existing investments made remediating thereby maintaining evenhandedness least zero ROI losses thru means forecast initially implementing enabling regulatory compliance gradually according approved procedures laying down required aids substantially materially post implementation validation tests depending upon thereon successful final configuration necessarily paving way ahead rightfully solidifying genuinely reliable outputs consequently eventually effecting complete satisfactorily reliable assurance programmes employed hereinabove assuring away frauds persistent proactivity focused analysis accompanied thenceforth serves further strengthening guard against possible violations imposed now due possibly brought forward hiccups sometime later strict auditing trackings measuring analyzing outcomes benefits achieved brings reassurance exhibiting conclusive evidence clearly pointing towards conclusive probability values achieved legitimately resultant much comforting bearing heartening derivatives summarized roundabout say bona fide truest ideals heretofore kept inviolate finally unfold favourably giving hope anew self sufficiency rest assured hereinafter met quotidian demand expertly following all contingencies anticipated expectedly acceptably hitherto foreseen occasionally comes handy whilst contemplating grandiose long terms ambition

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
  • Attributes
  • Custom attributes
  • Custom fields
Click outside to hide the comparison bar