Welcome to Shayarisher.com. Your privacy is very important to us. This document explains how we collect, use, share, and protect the information we gather when you visit or interact with our website. By using Shayarisher.com, you agree to the practices described in this policy.
1. Information We Collect
We may collect two types of information:
a) Personal Information — information you voluntarily provide when using the site, such as:
-
Your name, email address (e.g. when subscribing to a newsletter or when you contact us)
-
Any content you submit (comments, shayaris, feedback)
b) Non-Personal Information — information that does not by itself identify you, including:
-
Browser type, device type, operating system
-
IP address
-
Pages visited, time spent on pages
-
Referring / exit pages
-
Clicks, usage data for analytics
2. How We Use Your Information
We use both personal and non-personal information for purposes including:
-
Operating, maintaining, and improving our website
-
Customizing and enhancing your experience (for example, showing you content you might like)
-
Responding to your messages, questions, feedback
-
Sending newsletters, updates or promotional content, if you choose to opt in
-
Monitoring site usage and trends to diagnose trouble, plan content, or make decisions about features
-
Ensuring compliance with applicable laws or protecting rights
3. Cookies and Tracking Technologies
We use cookies and similar technologies (such as web beacons) to:
-
Remember your preferences (language, theme, etc.)
-
Track how users browse the site, so we can improve site navigation and features
-
Understand which content is most popular
-
Serve advertisements, if applicable
You can disable cookies in your browser settings, but some features of the website may not work properly without them.
4. Sharing Your Information
We will not sell, trade, or rent your personal information to third parties. But we may share your information:
-
With service providers who help us deliver / maintain the site (for example, hosting, analytics tools)
-
When required by law, legal process, or to protect our rights or the safety of others
-
In aggregated or anonymized form (so that individuals cannot be identified)
5. Data Security
We strive to protect your information. Some of the steps we take include using secure connections (HTTPS), limiting access to information, and following industry-standard security practices. However, no method of transmission over the Internet or method of storage is completely secure, so we cannot guarantee absolute security.









