IJ has created this privacy statement in order to demonstrate our commitment to your privacy.We understand your concerns about how your information is used and shared, and we endeavor to use such information carefully and sensibly. This page explains how the information you provide is collected and used.
Types of Information we collect?
We do not collect, store and use anonymous information and data regarding your access and use of IJ though we do receive anonymous user information whenever you interact with our websites, including your Internet Protocol (IP) address, browser type and version, the date and time of your request, geographical region, referral Uniform Resource locater (URL) , and other data automatically supplied by common web browsers. If you use our search services, we collect information on the search terms you submit and the links you click upon the results pages, but we never track IP.
We do track IP for the purpose of saving ourselves from cyber attacks and other security threats. As mentioned earlier, we do track search history based on IP.
Maintaining the anonymity of our users is one of the building blocks of our philosophy.
How Is Your Information Used?
The information we obtain from IJ is non traceable as its never tied to IP or any other user identifiable information/data. Non-personal information collected about you through your experience and queries is used to enhance the search results and filter out spam sites.
If you choose to receive communication from IJ directly or via use of any submission forms associated with the website, we may send you an email response as well as notify you of other offers or services that may be of interest. When you send email or other communications to us, we may retain those communications to respond to you and improve our products and services.
Other Disclosures of Your Information
Information saved by the users is fully secured and is never ever shared with third parties.
Web beacons, also known as web bugs, are small, graphic images that transparently reside on a Web site or other web-based service and are designed to allow the Web site or service owner to monitor who is visiting the Web site or using the service. Since we do not track individual search history or habits, we do not use Web Beacons.
Links to Third-Party Websites
Accessing IJ from Third-Party Sources
IJ may additionally be accessed through web widgets or gadgets that are embedded on third-party sites. If you choose to access IJ via such tools, then depending on the third-party widget technology, your personal information and queries may be passed on to the third party's servers prior to being processed on the IJ website
We take appropriate measures to ensure the security of our website and systems. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.
Effective as of January 11, 2011.