We’re committed to meeting all of your privacy, security and accessibility needs.
We regard your security and are focused on ensuring it. Our protection arrangement depicts how we gather and procedure your own information. When all is said in done your information is utilized for purposes such satisfying your request and regulating your record so as to offer the types of assistance you mentioned.
Cookies are small pieces of information that are placed on your computer when you visit a website. We use them to detect that you have logged on and are authorised to send cards, to collect anonymous analytic data which helps us improve our services and to track the effectiveness.
Terms of Service
This understanding portrays the standards of utilizing our site. By utilizing our site, you authenticate that you consent to our Terms and Conditions. On the off chance that you don’t concur, it would be ideal if you stop utilization of the site.
Electronic welcome cards can be an extraordinary assistance and wellspring of diversion to crippled and old clients, both as senders and as beneficiaries, and we are focused on guaranteeing that in structuring and programming our site, we consider the openness needs of the older and incapacitated and the Website Content Accessibility Guidelines (WCAG). If you don’t mind get in touch with us on the off chance that you have an inquiry or remark in regards to the openness of our site or need help utilizing our site.
We hold data gathered from you on our foundation just for the time important to satisfy the reason for which the data was gotten, (for example, charging data and utilization data), or for whatever length of time that the information holds an incentive to our business, (for example, to empower us to break down sorts of e-cards sent). Our rules portray which information is held, and to what extent that information will be put away before erasure or jumbling. Actually recognizable data (PII) isn’t held by us when a client has been idle for twenty-five months.
We have set up physical, electronic, and administrative methodology intended to help forestall unapproved access, to keep up information security and to utilize the data we gather online effectively and safely. In any case, it would be ideal if you note that transmission over the Internet or remote systems and the electronic stockpiling of data can’t be destined to be 100% secure by any site.