🇵🇸 نؤيد القضية الفلسطينية 🇵🇸

We have all the right and discretion to determine the appropriate outcome of fulfillment or breach of this policy by stakeholders in our organization. We also reserve the right to keep these results as confidential material or to make them public information.

The reason we receive user information is to enable us to provide services through our site to our end users. Such information contains, among other things, information that enables us to identify our customers and deal with them in accordance with the provisions of the relevant laws, such as information related to age, which makes us able to determine the eligibility of our customers to enter into a legally binding agreement, and the information required to enable our users to enter our site frequently such as the username and password, as well as the e-mail address that is used to manage the user account, especially in those cases when the login names and passwords are forgotten, and information that enables us to deal with the customer; as the preferred payment method, and information required to provide services to our customers; such as an email address, physical address, and mobile phone number. User information generally does not include information that we infer, collect, or extract, either by ourselves or through the use of third-party service providers.

Such information is based on the analysis of data we collect from many sources such as statistics and conclusions.

We are governed by applicable laws regarding the processing of private and personal data of Internet users. As a general rule, user information is processed electronically and is not accessible to stakeholders in the day-to-day working environment of our company. We may share user information with associated persons or third parties.

We will follow generally accepted industry standards to protect user information. Although no method of transmission over the Internet or electronic storage is completely secure, we will continue to attempt to use and implement commercially acceptable methods to protect user information in order to ensure the continuity of our service and the privacy of our users.

User information is a major asset in most businesses built on the Internet. As a company, we may always be subject to transactions relating to our assets and common stock including mergers, divisions, and acquisitions by third parties. User information is a key asset in evaluations that occur prior to these actions and a major asset transferred once those transactions occur.

We will ensure that our legal successors treat user information in the same manner as we do and that they continue to develop and implement means to better protect it.