Trivandrum Cake House collects personally identifiable information that you may voluntarily provide on online forms, which may include: user registration, bookings, contact requests, comments, surveys, and other online activities. The personally identifiable information (Personal Information) collected on this Site can include some or all of the following: your name, address, telephone number, email addresses, demographic information, and any other information you may voluntarily provide. You will have the choice whether or not to disclose such Personal Information in the above activities; however, some parts of the Site and some services may be more difficult or impossible to use if you choose not to disclose Personal Information. At the time of registration, you will have the option to receive future offers and updates from the Company by checking the appropriate opt-in box. If you choose to opt-in, your Personal Information will be kept in a secured database and We will alert you via email to new features, special offers, updated information and new services.
In addition to the Personal Information identified above, Our Web servers automatically identify computers by their IP addresses. Company may use IP addresses to analyze trends, administer the Site, track users movement and gather broad demographic information for aggregate use. To emphasize, IP addresses are not linked to Personal Information.
Further, Our Site may use technologies such as cookies to provide visitors with tailored information upon each visit. Cookies are a common part of many commercial Websites that allow small text files to be sent by a Website, accepted by a Web browser and then placed on your hard drive as recognition for repeat visits to the Site. Every time you visit Our Site, Our servers, through cookies, pixels and/or GIF files, collect basic technical information such as your domain name, the address of the last URL visited prior to clicking through to the Site, and your browser and operating system. You do not need to enable cookies to visit Our Site; however, some parts of the Site and some services may be more difficult or impossible to use if cookies are disabled. To emphasize, cookies are not linked to any Personal Information while on this Site. It does not contain your name, address, telephone number, or email address.
Company may use your Personal Information for any of the following purposes:
(a) to understand the use of the Site and make improvements
(b) to fulfill prizes
(c) to register visitors for online activities they choose to participate in such as: contests, surveys, employment applications, comment forms, or any other online interactive activities
(d) to respond to specific requests from visitors
(e) to protect the security or integrity of the Site if necessary
(f) to send notices ( if consent is provided) of special promotions, offers or solicitations
(g) in general (if consent is provided), to promote and market Company’s business and various products.
Users, who initially opted-in to receive future offers or promotional materials may subsequently opt-out by sending an email to email@example.com. Company will implement the change within three days of your request. Company will send an acknowledgement or confirmation of the request to the email address on file.
You control the accuracy of your Personal Information. If your Personal Information changes, feel free to correct, update or delete/deactivate it by emailing firstname.lastname@example.org If you wish to review your Personal Information that Company has on record, you may contact email@example.com .
Company uses appropriate security measures to protect all Personal Information collected in a secure, controlled environment. In addition, Company configures the list server software to refuse to divulge the email addresses of the list subscribers to anyone other than authorized Company staff members, including other list subscribers. In the event of a security breach whereby your Personal Information is acquired by an unauthorized person, Company will take appropriate steps to contain the breach to the extent reasonably possible.