Data Security & Protection
A brief about Technologies used in Data Protection and security(SAS/SSH/SSL ).
Secure Sockets Layer, that provides network security and privacy. SSL uses encryption
algorithms that include RC2, RC4, DES, TripleDES, IDEA, MD5, and others.
Certification Authorities (Cas)

We have developed our own CA by using products from companies such as RSA Security and Microsoft or from the Open Source Toolkit OpenSSL.

Digital Signatures
A digital signature affixed to an electronic document or to a network data packet
is like a personal signature that concludes a hand-written letter or that validates a
credit card transaction. Digital signatures are a safeguard against fraud.

Digital Certificates

Digital certificates are electronic documents that ensure the binding of a public key to an individual or an organization. Digital certificates provide protection from fraud.

Privacy Policy

This section well describes you that how we collect and use personal information towards your purchases .Your privacy is very important to us. Before or at the time of collecting personal information, we will identify the purposes for which information is being collected. We retain your personal information only for the purpose of dealing and processing your order and other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.

We will provide absolute confidentiality to your personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification. Privacy Protection and customer satisfaction is our first priority, which is 100% guaranteed.

Password Protected login keeps your information well secured under your account.Also you can edit your cart or view your latest purchases at your convenience.