All users have to abide by some terms of usage to register, subscribe, post content or use any service on the on the portal. All visitors are required to post authentic information about personal credentials like name, email id, profile picture and others. If any user is found to post any information which does not meet authenticity, user will be blocked to post any content on the portal. All users, please do not create multiple profile of registrations at the portal, all duplicate entries automatically get deactivated, hence your all profiles or ids might get blocked due to this act.
Any misleading information which is found to be hurting religious, gender or community sentiments of the any will be removed. Please use your discretion while post any content on the portal.
All users are required to post authentic and genuine information about any content being post. Any information which is found to be false or unclear about its authenticity, will be sent back to the user for review or correction.
Ethical use – All users are required to use portal ethically and should refrain from doing activities which are criminal in nature such as theft of information, forgery & mischievous activities. User doing malicious activity will be treated as per Indian Cyber Penal Law. Cyber crimes include attacking server and storage of portal to obtain unauthorized access. Attacking portal with malicious application such as virus, bug and trojan is considered violation of cyber law and culprit is relevantly treated as per law. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. are marked as offence by Cyber Crime regulated by Cyber Laws or Internet Laws.
Unauthorized access & Hacking – Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.
Denial of Service attacks – Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.
Cookies and browser settings to use all features of our portal –
Cookies do not typically contain any information that personally identifies a user, but personal information that we store about you may be linked to the information stored in and obtained from cookies.
We use both session and persistent cookies on our website.
The names of the cookies that we use on our website, and the purposes for which they are used, are set out below:
You may block cookies in the browser settings of your browser. However blocking all cookies will have a negative impact upon the usability of many websites. If you block cookies, you will not be able to use all the features on our website.
You can delete cookies already stored on your computer however deleting cookies will have a negative impact on the usability of many websites.