Privacy Policy

    SPIRIT PVT.LTD. also, its auxiliary organizations regard the security privileges of our online customers and perceive the significance of shielding the data gathered from you. We have embraced a corporate-wide Online Privacy Policy that guides how we gather, store and utilize the data you give on the website. Please note that this strategy applies to SPIRIT PVT. LTD. and its auxiliaries, and not to websites kept up by different organizations or associations to which we connect.
    If you have questions or concerns in regards to this assertion, you should initially contact SPIRIT PVT.LTD. at the email address or postal location determined on our landing page.

    1. Your contact subtleties, for example, client name, email address, telephone number and delivery address.

    2. Email correspondence by any client or client straightforwardly with us like item enquiry, request and exchange related data, questions or protests and so on

    3. Your exchange or banking subtleties, for example, MasterCard number, cardholder name, termination date and CVV or other data as needed for web banking or other instalment instruments isn't held by us, however, is held by our Payment Gateway accomplice (HBL CyberSource). Our instalment passage accomplice is "VeriSign Secured" and "PCI-Compliant" which guarantee the best expectations of wellbeing and security for your data.

    4. Your past orders and exchanges including the item and evaluating subtleties, the date of procurement, exchange data, instalment history and so forth

    5. Data from discretionary online studies on our or outsider locales may incorporate segment data (like sexual orientation, age, pay) just as item and administration inclinations of clients.

    6. Treats: Cookies is a piece of information put away by a site inside a program that empowers the program to recall data explicit to a given client, for example, clicking specific catches, signing in, or having perused certain pages on our site. All driving sites, for example, Amazon, Yahoo, Google and Facebook use treats. You can set your program to advise you when you are sent a treat, and you can choose whether or not to acknowledge it.

    7. Your meeting log data on our site incorporates your route inside the site, a wellspring of traffic, IP address (from which we can roughly decide client area), program type, program language, working framework, date and season of solicitation and so on

    Note: User-created content on the website shared by clients by means of audits, web journals, online talk or texts, conversation sheets, discussions, client tributes and so forth are not considered as close to home data and isn't dependent upon the conditions of this security strategy.

    We just gather client or client data as needed to direct our business and to empower us to offer the best types of assistance to our clients. We don't sell or lease this data to outsiders.

    Client data (as characterized above) will be utilized as depicted underneath:

    1. Client and client data will be sharable with our auxiliaries, offshoots and accomplices which are additionally associated with conveying the help to you as a client in your purchasing interaction. We will likewise have to share a few or the entirety of your data as represented on account of acquisitions by or consolidations with other business elements.

    2. We utilize a portion of the client and client data characterized above to comprehend client conduct and subsequently offer better and more important encounters to you. We utilize certain data in a collected structure across clients to assemble measurable and demographical profiles for our business and promoting exercises.

    3. We utilize this data to advise you about offers and arrangements, new dispatches, data about items you have bought, request and transportation status.

    4. We use meeting log and traffic stream data to see how clients are communicating with our website and to make upgrades. This will likewise be utilized by us to comprehend and dissect client inclinations, purchasing behaviors and conduct at a total level.

    6. We use IP address, traffic sources, client route across the site, program and OS data and so on to quantify generally speaking site execution as far as the number of clients, client commitment, time spent by clients on the site and so forth

    7. We should utilize client or client data in the event that needed in viewpoints like legitimate questions or other lawful cycles; consent to any legal or administrative prerequisite; investigate issues; identify and secure against blunder, extortion and other crook or criminal behavior; gather expenses owed; implement our terms and conditions; forestall maltreatment of our administrations; forestall infringement of the privileges of outsiders, different clients or the overall population

    Keep in touch with us at