img

Privacy Policy

Naman Computer Center's Privacy Policy outlines our commitment to safeguarding users' personal information. We collect data solely for internal purposes, ensuring confidentiality and security. Information such as name, contact details, and browsing behavior may be collected, used, and stored responsibly. We strictly adhere to data protection regulations and do not share personal information with third parties without consent. By using our services, users agree to the terms outlined in our Privacy Policy.









Privacy Policy

1. Data Collection: We collect personal information like name, contact details, and academic history solely for educational purposes.

2. Usage: Information collected is used to administer courses, provide support, and improve our services.

3. Data Security: We employ industry-standard measures to safeguard personal data against unauthorized access or misuse.

4. Third Parties: We may share data with trusted partners for operational purposes, ensuring confidentiality agreements are in place.

5. Cookies: Our website uses cookies to enhance user experience; users can manage cookie preferences via browser settings.

6. Data Retention: Personal data is retained only as long as necessary for the purposes outlined in this policy.

7. Policy Updates: Any changes to this policy will be communicated on our website; continued use of our services implies consent to the updated policy.

8. User Rights: Users have the right to access, correct, or delete their personal information upon request.

9. Contact: For inquiries regarding this policy or data privacy concerns, please contact us at privacy@namancomputers.com.

10. Compliance: We adhere to relevant data protection laws and regulations in all jurisdictions where we operate.




Privacy Policy of Naman Computer Center 15 questions with answers


  1. 1. What information do you collect from users?

    • We collect users' basic personal information such as name, email, and contact details for enrollment and communication purposes.
  2. 2. How is users' information used?

    • Users' information is used solely for administrative purposes, to communicate with them regarding courses, events, and updates.
  3. 3. Is users' information shared with third parties?

    • No, we do not share users' information with third parties unless required by law or with explicit user consent.
  4. 4. How is users' data protected?

    • We employ robust security measures to safeguard users' data against unauthorized access or disclosure.
  5. 5. Are cookies used on the website?

    • Yes, we use cookies to enhance user experience and track website usage for analytics purposes.
  6. 6. Can users opt out of cookies?

    • Yes, users can manage cookie preferences through their browser settings.
  7. 7. How is users' consent obtained?

    • Users' consent is obtained through clear opt-in mechanisms during enrollment and website usage.
  8. 8. Do you comply with data protection laws?

    • Yes, we strictly adhere to all relevant data protection laws and regulations.
  9. 9. Is users' data stored securely?

    • Yes, users' data is stored on encrypted servers with restricted access.
  10. 10. How long is users' data retained?

    • Users' data is retained only for as long as necessary to fulfill the purposes outlined in our privacy policy or as required by law.
  11. 11. Can users request access to their data?

    • Yes, users have the right to request access to their data and request corrections or updates as needed.
  12. 12. Is there a process for data deletion upon request?

    • Yes, users can request the deletion of their data, and we will promptly comply, subject to legal obligations.
  13. 13. How are users notified of changes to the privacy policy?

    • Users are notified of any changes to the privacy policy through email or website announcements.
  14. 14. Is there a designated privacy officer for inquiries?

    • Yes, we have a designated privacy officer who oversees privacy-related matters and addresses user inquiries.
  15. 15. Is there a procedure for handling privacy breaches?

    • Yes, we have a documented procedure for handling privacy breaches, including investigation, mitigation, and notification to affected users and authorities.