What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, IP Addresses or other details to help you with your experience.
When do we collect information?
We collect information from you when you subscribe to a newsletter, respond to a survey, fill out a form or enter information on our site.
Click affiliate links
Click internal other article link
Go to other social sites from a link on our page.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
- To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
- To improve our website in order to better serve you.
- To allow us to better service you in responding to your customer service requests.
- To administer a contest, promotion, survey or other site feature.
- To send periodic emails regarding your order or other products and services.
How do we protect your information?
- We do use vulnerability scanning and/or scanning to PCI standards.
- We only provide articles and information. We never ask for credit card numbers.
- We use regular Malware Scanning.
- There are server level scanners, firewalls and intrusion detection technologies.
- We also maintain good status at VirusTotal, Sucuri and Norton SafeWeb
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use ‘cookies’?
- Understand and save user’s preferences for future visits.
- Keep track of advertisements.
- Compile aggregate data about site traffic and site interactions in order to offer better site experiences and tools in the future. We may also use trusted third-party services that track this information on our behalf.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, It might affect the user’s experience.
You can read about all the Cookies used at GeekAct.com
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when it’s release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property or safety.
However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Occasionally, at our discretion, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.
Many links will be cloaked links and will hide actual destination till clicked. These destinations are verified, safe and only directs to the product or service you are interested. These links are masked them to show as internal, short and meaningful and to provide aesthetic looks.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We use Google AdSense Advertising on our website.
We have implemented the following:
- Remarketing with Google AdSense
- Demographics and Interests Reporting
- DoubleClick Platform Integration
We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page or by using the Google Analytics Opt Out Browser add on.
California Online Privacy Protection Act
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
Can change your personal information:
- By emailing us
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It’s also important to note that we allow third-party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old. Our technology guides, reviews, software giveaways and jailbreaking/rooting/flashing articles may influence techsavvy children to experiment on their devices or of others. However, the risk of economic loss is always declared at such places.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
- Within 7 business days
We will notify the users via in-site notification
- Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
- Send information, respond to inquiries, and/or other requests or questions
To be in accordance with CANSPAM, we agree to the following:
- Not use false or misleading subjects or email addresses.
- Identify the message as an advertisement in some reasonable way.
- Include the physical address of our business or site headquarters.
- Monitor third-party email marketing services for compliance, if one is used.
- Honor opt-out/unsubscribe requests quickly.
- Allow users to unsubscribe by using the link at the bottom of each email.
If at any time you would like to unsubscribe from receiving future emails, you can email us at
- Follow the instructions at the bottom of each email and we will promptly remove you from ALL correspondence.
Technologies used on GeekAct.com
As a base, we use self-hosted WordPress package on Namecheap (Privacy) server. This is updated whenever there is one. WordPress is also GDPR compliant.
There are tracking tools as below,
- In-built website cookies
- Google Analytics
- MailRelay eMail marketing analytics
- Ninja Popups tracking
- Jetpack tracking
- Email, Comment and IP logging via comment form
- IP logging, and email id logging via Contact Me form
- Affiliate lead tracking
We also use these third party plugins to make site better and feature rich.
- Akismet Anti-Spam
- FV Gravatar Cache
- Jetpack by WordPress.com
- Ninja Popups
- Pretty Links
- Shortcodes Ultimate
- The SEO Framework
- WP Fastest Cache
Embedded Content From Other Websites
Typically embedded content is from websites that share videos, images, or other content. These services may collect your IP Address, your User Agent, store and retrieve cookies on your browser, embed additional third-party tracking, and monitor your interaction with that embedded content, including correlating your interaction with the content with your account with that service, if you are logged in to that service.
Links to the privacy policies of the services have been included below. Country specific policies will always supersede the general one.
- Google Plus
- WordPress Plugin Directory
- YouTube (Google)
Hosting and API calls
GeekAct.com is hosted at NameCheap hosting. The server is managed by Mrinal Buddekar, Owner/Admin/Author. The data which is stored is mainly our images, programming API calls, website files, certain scripts, backups and databases. Databases contain all the Articles, Pages, Comments, Contact form data and emails sent to us. This all takes place over HTTPS (SSL) connection and is stored securely with database encryption keys.
This is not accessible to anyone other than Admin. If any user wants to access, remove, or alter their data, it will be done so upon email request.
Image and heavy multimedia content is many times is served by CloudFlare (CDN) service. This is third party service which helps us to load site faster and also acts as defense for Hacking and Spam attacks. There is not personal or dynamic data stored on CloudFlare.
What Rights You Have Over Your Data
If you have left comments,l contacted by email on our site you can request to see or download the data we have about you.
Typically for visitors that have left comments, the data will be their email address, any IP addresses assigned to them at the time of leaving the comments and the user agent strings of the browsers they used. The rest of the data is public as published by the visitors.
You can also request “to be forgotten” and we will erase any personally identifiable data we have about you. Of course, this excludes data we need for administrative or security purposes or if we are required by law to retain some of the data.
An individual who seeks access, or who seeks to correct, amend, or delete inaccurate data, should direct his/her query to firstname.lastname@example.org. We will respond within a reasonable timeframe, not to exceed one week.
Thane, Maharashtra 421204
NOTIFICATION OF CHANGES
Last Edited on 24-MAY-2018