Who we are
Our website address is:https://dhivo.in.
Comments
Information for Visitors and the Comment Policy
We gather certain information when users post comments on our website in order to support the integrity, security, and quality of the comment system. This comprises:
Your name, email address, website (if supplied), and the substance of your comment are among the details you put in the comment form.
The IP address of the visitor, which aids in detecting and stopping abusive or spammy activity.
The browser user agent string aids in spam detection and offers details about the device and browser type being used.
Utilizing the Gravatar Service
We might make use of the Gravatar service, which enables users to link a profile photo to their email address, to improve user experience and customize your online presence. In order to determine whether you have a Gravatar profile linked to your email address, the Gravatar service may receive an anonymized string (also known as a hash) when you leave a remark.
Your Gravatar profile photo will be made publicly visible next to your comment on the website if a match is found and your comment is accepted, making the comment section more interesting and unique.
We respect your privacy and take steps to guarantee that the information gathered is used sensibly and in compliance with our privacy guidelines.
Media
Uploads of Images and Location Information
Please be mindful of the following if you decide to submit photographs to our website via blog posts, user profiles, comments, or any other submission form:
EXIF data is embedded metadata found in many digital photos, particularly those captured by cellphones or cameras with GPS. Sensitive data like GPS coordinates, device information, and other technical specifics may be included in this metadata.
Data on Location (EXIF GPS)
The precise geographic location where the photo was shot can be determined using EXIF GPS data.
Such information could stay imbedded in the picture file if it is not deleted before posting.
The Significance of This
Generally speaking, images posted to the website are available to the public, which means:
These photos are available for other users to see, download, and examine.
Users may be able to extract location information from the image files with no technical expertise.
This might make your house, place of employment, or other commonly frequented locations publicly available.
Suggestion
In order to safeguard your privacy, we highly advise that you:
Before uploading your photos, make sure they don’t contain any embedded location data (EXIF GPS).
Utilize online resources or photo editing software that enables you to extract metadata from picture files.
You accept this risk by submitting content, and you are in charge of making sure your photos don’t include any private or sensitive information you don’t want to publish.
Cookies
Use of Cookies and User Choices
Cookies are used by our website to improve your experience, store your preferences, and support necessary site features. Cookies are little text files that your web browser saves on your device.
Cookies in Comment Forms
When you post a remark on our website, you have the option to allow us to save your:
Name
Email address
URL of the website
You don’t have to provide the same information every time you post a new remark because these facts are saved in cookies for your convenience. These cookies are intended to:
Enhance the user experience
Simplify upcoming communications
stay in effect for a year unless you actively delete them from your browser’s settings.
Cookies on the Login Page
We create a temporary cookie when you visit our login page to see if your browser is set up to accept cookies. This cookie
contains no personal information.
is only employed for checking compatibility.
is deleted automatically when your browser is closed.
Login and Display Preferences for Accounts
To accommodate your session and interface settings, we set a number of cookies when you connect into your account:
Your login credentials and status are safely stored via login cookies (passwords excluded).
These cookies keep for two days.
Choosing “Remember Me” will keep you logged in for two weeks.
Show preference cookies (such interface settings and screen layout)
These cookies are good for a year.
All cookies connected to your login are automatically deleted from your browser when you log out.
Editor Cookies (For Contributors and Authors)
An extra cookie will be made when you change or publish material on the website if you are authorized to do so. This cookie
keeps the article’s Post ID that you edited.
excludes personal information
is employed internally to oversee publishing-related tasks.
ends after a day.
Controlling Your Preferences for Cookies
Through the settings of your web browser, you may control or remove cookies at any moment. Please be aware that blocking some cookies may have an impact on how well the site works or functions, particularly for contributors or registered users.
Please refer to our complete [Privacy Policy] for further information about how we handle personal data.
Embedded content from other websites
Including Information from Other Websites
There may be embedded content from third-party platforms on some of this website’s pages and articles. This could consist of, but is not restricted to:
Videos (like those on Vimeo and YouTube)
Pictures (such as Pinterest pins and Instagram posts)
articles or postings on social media (such as Facebook embeds or tweets)
The Operation of Embedded Content
The behavior of embedded content is identical to that of a direct visit to the external website. Even if you are still on our site, the third-party service that offers such content may automatically gather information about your visit and interaction while it is presented on our site.
What These External Websites Could Do
The third-party website may do the following when you interact with embedded content:
Gather personal information about your device, browser, and IP address.
Put cookies on your computer to monitor how you browse.
Incorporate third-party tracking scripts, such as analytics or advertising systems.
Keep track of your activities with the attached content, including whether you clicked on it and how long you spent viewing it.
If you are signed into their platform, such your Google, Facebook, or Twitter account, link this behavior to your profile.
Important Information
How these third-party websites gather and utilize your information is outside of our control.
Our privacy policies do not control interactions with embedded material; rather, they are governed by the privacy rules of the individual third-party platforms.
Before engaging with the embedded material of those services, we advise reading their privacy policies.
You understand that such data gathering and monitoring may take place outside of our platform’s control if you use our site and interact with embedded content.
You can link this activity to your profile on platforms like Google, Facebook, or Twitter if you are currently logged in.
Crucial Information
The collection and use of your data by these third-party websites is not within our control.
We do not control interactions with embedded material; rather, the privacy rules of the individual third-party platforms do.
Before engaging with their embedded material, we advise reading through those services’ privacy policies.
By using our website and interacting with embedded content, you agree that our platform may not have any control over the gathering and tracking of such data.
Who we share your data with
Requests for Password Resets and IP Address Logging
Certain information is automatically gathered and added to the process when you request a password reset on our website in order to help protect your account.
What Data Is Gathered?
We include your IP address in the password reset email that is sent to the email address you registered with as part of the password reset process. This accomplishes several significant goals:
Security Monitoring: By providing the IP address, it is possible to determine whether the request came from a reliable or possibly dubious source.
User Awareness: It enables you, the account holder, to confirm if you or another person made the request.
Fraud Prevention: Having the IP address logged in the email can help detect and stop harmful behavior in the case that an unauthorized person tries to reset your password.
What Makes This Significant?
You have more control over the security of your account thanks to this increased transparency.
We strongly advise resetting your password right away and getting in touch with our support staff if you see an IP address in the reset email that you do not recognize. This could indicate unwanted access.
We are dedicated to preserving your security and privacy, and one of the many measures we take to secure your personal data is to include the IP address in password reset emails.
How long we retain your data
Data Storage for User Accounts and Comments
In the event that you create an account on our website (where account registration is possible), we will gather and save the personal data you enter while creating your profile. This could consist of:
Your name or display name
Email address
Avatar or profile image
bio or URL of the website (if applicable)
Any settings or preferences you set
You may manage your personal data in your user profile after registering. In particular:
By going to your account settings, you can see, amend, or remove your personal information at any time.
However, once your username has been generated, it cannot be changed for security and system integrity reasons.
In order to help with technical support, content management, or policy enforcement, website administrators can view and update user information.
Every user’s information is safely saved and handled in compliance with our privacy policies. Your profile information will be deleted if you delete your account, but system-level or anonymized data might be kept if necessary for administrative, security, or legal reasons.
What rights you have over your data
Your Personal Data Rights
We are dedicated to providing you with control over your personal data because we value your privacy. You have the right to control the personal data we save about you if you have an account on our website or have previously submitted comments.
Portability and Access to Data
A copy of the personal information we have gathered and kept on you is available upon request. This comprises, though is not restricted to:
Details about your account, including your name, email address, and username
Your profile information and specified settings
Posts or comments you’ve made
Any other information you have voluntarily supplied via forms or other website interactions
To promote data portability and openness, we will make this information available upon request in a widely used, machine-readable format (such as a downloaded file).
Requests for Data Deletion
Additionally, you have the right to ask that any personal information we may have about you be deleted. Another name for this is the “right to be forgotten.” When your request is received, we will:
Remove your personal data from our systems permanently or anonymize it.
Anything that can be connected to you, like comments, should be removed or disassociated.
Significant Exclusions
Please be aware that the following data is exempt from your request to have it deleted: information that we are legally or operationally compelled to keep
Information required for administration tasks, including controlling user rights or website operations
Documents required for legal compliance, including tax returns or court cases
Data kept for security reasons, such as investigating account abuse or preventing fraud
These exclusions aid in our adherence to relevant legal requirements while maintaining the security and integrity of our platform.
How to Submit a Request
Please use our designated privacy contact form or support email to contact us with a request for data access or deletion. To safeguard your information and ensure that you have the right to submit the request, we might need identity verification.
Where your data is sent
Monitoring of Comments and Spam Detection
An automated spam detection service may be used to filter visitor comments in order to preserve the caliber, security, and applicability of conversations on our website.
How It Operates
The system may automatically forward comment data to a third-party spam detection service upon submission. Usually, this procedure include examining:
The comment’s textual content
The commenter’s IP address
If given, the email address
The user agent in the browser
The way comments are made (frequency, timing, links provided, etc.)
These elements are used to determine whether a comment is legitimate or possibly dangerous, such as automated bot activity, spam, or phishing efforts.
The Reason This Is Required
By employing automated spam detection, we can:
Cut down on undesirable information, like ads and harmful links.
Protect website visitors from harmful content, viruses, and frauds.
Keep the conversational atmosphere positive and secure.
Outside Services
Trusted third-party companies like Akismet, who handle the data in accordance with their own privacy policies, may be a part of the spam detection system. Global spam databases and machine learning are used by these services to gradually increase their efficacy and accuracy.
Please take note that by leaving a comment, you agree that these services may use the information you enter to prevent spam.