We value the trust you place in Utmaliya Sales That’s why we insist upon the highest standards for secure transactions, customer information confidentiality and privacy.
Request you to kindly read the following statements to learn about our information gathering and dissemination practices.
Please note: Our privacy policy is subject to change at any time without prior notice. To make sure you are aware of any changes, please review this policy frequently/ periodically.

  1. Collection of Personally Identifiable Information
    We collect personally identifiable information (name, phone number, email address, registered address etc.) from you when you set up an account with shree Laxmi traders While you can browse some sections of our site without being a registered member, certain activities (such as placing an order) do require prior registration.
    We shall use your contact information to send you offers based on your previous orders and your interests.
  2. Use of Demographic and Profile Data
    We do not use your personal information to send out any kind of irritating marketing emails or text messages. We shall only use your personal information to resolve disputes; troubleshoot problems; help promote a safe service; collect fees owed; measure consumer interest in our products and services, products, services and updates; customize your experience; detect and protect us against error, fraud and other criminal activity; enforce our terms and conditions and as otherwise described to you at the time of collection.
    In our efforts to continually improve our product and service offerings, we collect and analyze demographic and profile data about our users’ activity on our website.
    We identify and shall use your IP address to help diagnose problems with our server and to administer our website.
    Your IP address is also used to help identify you and to gather broad demographic information.
  3. Security Precautions
    Our website has stringent security measures in place to protect the loss, misuse and alteration of the information under our control. Once your information is in our possession.
    we shall adhere to strict security guidelines, protecting it against unauthorized access.