User’s data and agreement
Personal information means the information identifying the user’s name, identification number, email address, age, phone number, password or any financial account information provided to Winners Life Training and Consultancy at the time of registration for any course mentioned or any time thereafter.
Winners Life Training and Consultancy will not take responsibility or face any form of liability with regards to the data collected by third party users whose links and cookies that may appear on our website over which we do not exercise any control. Furthermore, we do not assure the accuracy, integrity or quality of the information provided, data accessed, text, software, audio, video, photographs, messages or any other available material on such third party links that may appear on our website. The user is encouraged to read the privacy policies laid down by such third party websites.
Users’ personal information may be shared with third parties who pose a need or possess the authority to receive such information, if we have discerned and believe that access, use, preservation or disclosure of such information is reasonably necessary to comply with (i) in response to any authority having to receive such information under law (ii) any order of court (iii) detect, prevent, or otherwise address fraud, security or technical issues (iv) protect against harm to the rights, property or safety of Winners Life Training and Consultancy, our users or the public as required or permitted by law.
User’s information and protection
The user is hereby informed that any other information requested on our registration page, including the request to receive promotional offers from us, is optional. We may include other optional requests for user’s information to help us customize the website and deliver personalized information to the user. The user is informed that in order to protect the security of his/her personal information during transmission; we use Secure Sockets Layer (SSL) software, which encrypts the information user’s input. To prevent unauthorized access to sensitive information, it is important for the user to monitor anyone who has access to the personal password and user’s computer, laptop or any other device through which the user’s account can be accessed. User is requested to sign off while using a shared computer.
Policy changes and grievance reporting