Our purpose is to promote trust in the Guitar Hall brand through transparent, consistent, and reliable use of personal information.
Your Privacy Rights
How we collect information about you
When you visit the Guitar Hall website or use payment gateaway Services, we collect information sent to us by your computer, mobile phone or other access device. The information sent to us includes data on the pages you access, your computer IP address, device identifiers, the type of operating system you’re using, your location, mobile network information, standard web log data and other information. Web log data includes the browser type you’re using and traffic to and from our site. When you visit the guitarhall.in website or use payment gateaway Services, we also collect information about your transactions and your activities.
We may also obtain information about you from third parties such as credit bureaus and identity verification services.
In order to help protect you from fraud and misuse of your personal information, we may collect information about your use and interaction with our website . For example, we may evaluate your computer, mobile phone or other access device to identify any malicious software or activity.
We may also collect additional information from or about you in other ways, such as through contact with our customer support team, results when you respond to a survey and from interactions with members of Guitar Hall.
How we protect and store personal information
Throughout this policy, we use the term "personal information" to describe information that can be associated with a specific person and can be used to identify that person. We do not consider personal information to include information that has been made anonymous so that it does not identify a specific user.
We store and process your personal information on our computers. We protect your information using physical, technical, and administrative security measures to reduce the risks of loss, misuse, unauthorized access, disclosure and alteration. Some of the safeguards we use are firewalls and data encryption, physical access controls to our data centers, and information access authorization controls.