Who we are
Our Online Shop name is “EmyooStore” and our website address is:
What personal data we collect and why we collect it
The information is updated on 23 March 2024 and will be updated time to time as required for “EmyooStore” (“us”, “we”, or “our”) operates “https://emyoostore.emyoosolutions.com/” (the “Site”). This page informs you of our policies regarding the collection, use and disclosure of Personal Information we receive from users visiting the website. We use your Personal Information only for processing your orders and providing you with convenience to use our platform for signing in and improving the Site. By using the Site, you agree to the collection and use of information in accordance with this policy.
Comments
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.
Media
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Communications:
We may use your Personal Information to contact you with newsletters, marketing or promotional materials and other information.
Cookies
Cookies are files with small amounts of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive. Like many sites, we use “cookies” to collect information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Site.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.
When it comes to the handling of your personal data, transparency is essential to us. Here’s how we manage the information you entrust to us:
Who we share your data with
Our company operates with a stringent privacy policy, ensuring that your data is protected and shared only when necessary. We may disclose your personal information to third parties under limited circumstances, such as:
- Service Providers: We employ other companies and individuals to facilitate our services — for example, payment processing, data analysis, email delivery, hosting services, customer service, and marketing efforts. These third parties have access to your personal data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.
- Compliance with Laws: We may disclose your information where required to do so by law or subpoena or if we genuinely believe that such action is necessary to comply with the lawful requests by public authorities (including to meet national security or law enforcement requirements), enforce our policies, or protect the rights, property, or safety of ourselves or others.
- Business Transfers: In the event that we are involved in a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets, personal data held by us about our users may be among the transferred assets.
- Affiliates: We may share your data with our affiliates, in which case we will require those affiliates to comply with this privacy policy. Affiliates include our parent company, any subsidiaries, joint venture partners, or other companies that we control or are under common control with us.
- With your consent: We may share personal data with third parties outside of the situations listed above when we have your explicit consent to do so.
We always aim for minimal data sharing and consider it only when necessary to provide you with our services or to comply with the law. If you have questions about the parties with which your personal data may be shared, please reach out to us for further information.
Analytics/Logging of Data
Like many site operators, we collect information that your browser sends whenever you visit our Site (“Log Data”). This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser type, browser version, the pages of our Site that you visit, the time and date of your visit, the time spent on those pages and other statistics. In addition, we may use third party services such as Google Analytics that collect, monitor, and analyses this data.
If you request a password reset, your IP address will be included in the reset email.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where We Send Your Data
Visitor comments may be checked through an automated spam detection service. Additionally, if we engage with third-party services for processing or storing data, appropriate measures are taken to ensure that your data is handled securely in accordance with this privacy policy. Data may also be shared with regulatory bodies if required by law or in order to protect our rights or the rights of others. We do not sell your data to any third party.
For international data transfers outside of your jurisdiction, we comply with applicable laws and ensure that adequate data protection standards are met, which may include entering into data transfer agreements or ensuring the recipient entities are certified under appropriate data protection frameworks.
Visitor comments may be checked through an automated spam detection service.
Additional information
Additional Information may be collected through our “contact us” page and others means like email address and phone number provided on our website and mentioned below,
Manager Sales EmyooStore,
emyoobusiness@gmail.com
Ph: 03085868446
What data breach procedures we have in place
When it comes to safeguarding your information, we take several comprehensive measures to ensure your data remains secure and private:
- Encryption: We use strong encryption protocols to protect data in transit over the internet as well as data at rest on our servers.
- Access Controls: Strict access controls are in place to limit who can access your data. Only authorized personnel with a legitimate need are granted access rights.
- Regular Audits: We conduct regular security audits of our systems and processes to identify potential vulnerabilities and mitigate them promptly.
- Data Anonymization: Wherever possible, we anonymize data to protect user privacy, ensuring that personal details are not linked to data analytics.
- Secure Data Centers: Our servers are housed in secure data centers with physical security measures, including surveillance and bio-metric access controls.
- Protection from Data Breach: We have deployed sophisticated intrusion detection and prevention systems to monitor for and mitigate the effects of data breaches.
- Firewalls: State-of-the-art firewall technology is employed to protect internal networks from unauthorized access and potential cyber threats.
- Incident Response Plan: We have an incident response plan in place to quickly address any data breaches or security incidents.
- Data Privacy Compliance: We ensure that our data handling practices are compliant with pertinent data privacy laws and regulations, like GDPR and CCPA.
- User Controls: Users are provided with tools and settings to control their data privacy and accessibility.
- Two-Factor Authentication: We offer and recommend using two-factor authentication for an added layer of security on user accounts.
- Regular Updates: Our security systems and software are updated regularly to protect against known vulnerabilities.
- Education and Training: We regularly train our staff in best practices for data security and privacy awareness.
By implementing these protocols, we demonstrate our commitment to protecting your data with a multifaceted, robust approach to security.
What Third Parties We Receive Data From
We receive data from a variety of third-party service providers to ensure the seamless operation of our services, investigate fraud, improve user experience, and offer personalized content. These third parties include:
- Analytics Providers: Services such as Google Analytics help us understand user behavior on our website.
- Advertising Networks: We may receive anonymized data from advertising networks that help us to target and optimize our advertising campaigns.
- Payment Processors: Companies like PayPal or Stripe provide us with payment and billing information to facilitate transactions.
- Cloud Services: Providers like Amazon AWS and Microsoft Azure offer hosting and other technical services, contributing to the infrastructure our services rely on.
- Social Media Platforms: Facebook, Twitter, and LinkedIn may share data based on user permissions, which helps to tailor our social media strategies.
- Customer Support Services: We utilize third-party customer support services to manage user inquiries and feedback more efficiently.
The data received from these third parties conforms to our privacy policy and is handled with the utmost care for user privacy and data security.
What automated decision making and/or profiling we do with user data
At our company, we employ automated decision-making and profiling mechanisms to enhance user experience, improve our service offerings, and ensure efficient management of user data. Here’s how we use such processes:
- Personalization of Content and Recommendations: By analyzing user preferences, browsing history, and interaction with our services, we create personalized experiences. This means users receive content suggestions and product recommendations that are most relevant to them.
- User Segmentation for Marketing: We segment users based on their activity and demographic information to tailor our marketing campaigns. This ensures that users see advertisements and promotional content that align with their interests.
- Fraud Detection and Security Measures: Our automated systems scan for unusual activities to prevent fraud and protect user data. This includes analyzing transaction patterns and login behaviors to quickly identify and respond to potential security threats.
- Customer Support Chatbots: We use automated chatbots to provide immediate responses to user inquiries. These chatbots learn from user interactions to improve the accuracy and helpfulness of their responses over time.
- Efficiency in Service Operation: We automate certain decision-making processes to speed up service delivery, such as sorting user requests or prioritizing helpdesk tickets based on urgency.
All automated decision-making and profiling actions are designed with user privacy in mind, complying with relevant data protection laws and regulations. Users have the right to opt-out of certain automated processes and can request human intervention where appropriate.
Industry Regulatory Disclosure Requirements
In many industries, businesses are required to disclose certain information due to statutory and regulatory mandates. These requirements are put in place to promote transparency, ensure public safety, and maintain fair practices. Compliance is critical, as failure to meet these obligations can result in significant fines, legal action, and damage to a company’s reputation.
The specifics of these regulatory disclosure requirements vary widely among industries:
Financial Services
In the financial industry, regulatory bodies like the Securities and Exchange Commission (SEC) in the U.S. and Pakistan impose rigorous reporting standards. Companies must disclose their financial condition, investment policies, and risks to investors.
Health Care
Healthcare providers and pharmaceutical companies must adhere to regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. that protect patient privacy. They must also disclose adverse drug effects and clinical trial results to the Food and Drug Administration (FDA).
Energy Sector
Energy companies must report on environmental impacts, emissions, and compliance with the Environmental Protection Agency (EPA) regulations. They are often required to make known their safety protocols and disaster recovery plans.
Technology and Internet
Technology companies, especially those that handle personal data, are subject to regulations like the General Data Protection Regulation (GDPR) in the European Union that govern data protection and privacy.
Food and Beverage
Food producers must comply with labeling laws and disclose nutritional information, allergens, and, in certain jurisdictions, genetically modified organism (GMO) content.
These regulations are subject to change and can be influenced by evolving laws, technological advancements, and public concerns. Organizations should constantly monitor their compliance and be prepared to update disclosure practices as necessary.