Help Center / Privacy Policy / What security procedures are in place to protect information from loss, misuse or alteration?

What security procedures are in place to protect information from loss, misuse or alteration?

To protect against the loss, misuse and alteration of the information under our control, and to comply with Rule 8 of IT Rules, 2011 (Reasonable security practices and procedures and sensitive personal data or information), we have in place appropriate physical, electronic, technical, operational and managerial procedures.

Our servers are accessible only to authorized personnel and your information is shared with respective personnel to complete the transaction and to provide the services requested by you.

Although we will endeavor to safeguard the confidentiality of your sensitive personal identifiable information, transmissions made by means of the Internet cannot be made absolutely secure. By browsing, accessing, using our website in whatsoever manner, you agree that we shall have no liability for disclosure of your information due to errors in transmission or unauthorized acts of third parties including any cyber-attacks.

Have more questions? Submit a request.

Also Read...

About Pixean Getting Started Payments Guidelines Photos Workshops Blogs Places FAQs Privacy Policy Terms and Conditions

What security procedures are in place to protect information from loss, misuse or alteration?

To protect against the loss, misuse and alteration of the information under our control, and to comply with Rule 8 of IT Rules, 2011 (Reasonable security practices and procedures and sensitive personal data or information), we have in place appropriate physical, electronic, technical, operational and managerial procedures.

Our servers are accessible only to authorized personnel and your information is shared with respective personnel to complete the transaction and to provide the services requested by you.

Although we will endeavor to safeguard the confidentiality of your sensitive personal identifiable information, transmissions made by means of the Internet cannot be made absolutely secure. By browsing, accessing, using our website in whatsoever manner, you agree that we shall have no liability for disclosure of your information due to errors in transmission or unauthorized acts of third parties including any cyber-attacks.

Articles in the section
Also Read...
About Pixean Getting Started Payments Guidelines Photos Workshops Blogs Places FAQs Privacy Policy Terms and Conditions
Have more questions? Submit a request.

What security procedures are in place to protect information from loss, misuse or alteration?

To protect against the loss, misuse and alteration of the information under our control, and to comply with Rule 8 of IT Rules, 2011 (Reasonable security practices and procedures and sensitive personal data or information), we have in place appropriate physical, electronic, technical, operational and managerial procedures.

Our servers are accessible only to authorized personnel and your information is shared with respective personnel to complete the transaction and to provide the services requested by you.

Although we will endeavor to safeguard the confidentiality of your sensitive personal identifiable information, transmissions made by means of the Internet cannot be made absolutely secure. By browsing, accessing, using our website in whatsoever manner, you agree that we shall have no liability for disclosure of your information due to errors in transmission or unauthorized acts of third parties including any cyber-attacks.