Security Policy

  • For security purposes and to ensure that this service remains available to all users, the host of this website employs commercial software programs to monitor network traffic for identifying unauthorized attempts to upload or change information, or otherwise cause damage.
  • Except for authorized law enforcement investigations, no other attempts are done to identify individual users or their usage habits. Also, the raw data logs are used for no other purposes and are scheduled for regular deletion.
  • Unauthorized attempts to upload or change information on this website are strictly prohibited. Such instances may be dealt and punishable under the Indian Information Technology Act 2000, its amendments and rules made there under.