Privacy Policy

Privacy Policy

Privacy Policy

Privacy Policy respects your privacy. It describes the ways in which your personal information is collected and used.

Information gathering:

Our website registration form requires you to give us minimal contact information like your name and email address etc.

Automatic information

We may at some time, receive and store certain types of information whenever you interact with us, e.g. the use of “cookies”

Information from Other Sources

We might receive information about you from other sources. Phykon collects non-personally identifying information your browser makes available whenever you visit a website. This information includes your Internet Protocol address, browser type, browser language, the date and time of your query and one or more cookies that may uniquely identify your browser. We may use Internet Protocol (IP) address:

(i) To diagnose problems with our server(s) and/or to administer our website to identify portions of our website which users visit frequently.

(ii) To improve our website to ensure smooth navigation for our users and to help us make our website more useful to visitors.

Get In Touch Forms:

Information on our website is gathered directly when you voluntarily provide information through our contact us form, request for information form or query forms. You have the complete freedom to decide whether or not to submit personal information to our website.

What personal information do we collect from the people that visit our blog, website or app?

When ordering or registering on our website, as appropriate, you may be asked to enter your name, mailing address or other details to help you with our experience.

When do we collect information?

We collect information from you when you fill out a form or enter information on our website.

Third-party links

We do not include or offer third-party products or services on our website.

We do not use Malware Scanning.

Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive information you supply is encrypted via Secure Socket Layer (SSL) technology.