Publisher logo 3

Terms & Conditions

This page tells you the terms of use on which you may make use of our online library, as a guest user. Please read these terms of use carefully before you start to use the site. By using our site, you indicate that you accept these terms of use and that you agree to abide by them. If you do not agree to these terms and conditions, please refrain from using our site.

 

Accessing Our Site

Our site is intended to use for non-commercial only. Non-commercial refers to an activity or entity that does not in some sense involve commerce, at least relative to similar activities that do have a commercial objective or emphasis.

 

Limited License

You may access and view the content on the Site on your computer or other Internet compatible device, and make single copies or prints of the content on the Site for your personal, internal use only. The Site and the services offered on or through the Site, including any content and materials thereon, are only for your personal, non-commercial use.

 

Trademarks

The trademarks, logos, service marks and trade names (collectively the "Trademarks") displayed on the Web Site or on content available through the Web Site are registered and unregistered Trademarks of Foster Academics and others and may not be used unless authorized by the trademark owner. All Trademarks not owned by us that appear on the Web Site or on or through the Web Site's services, if any, are the property of their respective owners. Nothing contained on the Site should be construed as granting, by implication, estoppel, or otherwise, any license or right to use any Trademark displayed on the Site without our written permission or that of the third party rights holder. Your misuse of the Trademarks displayed on the Site is strictly prohibited.

 

Cookies

To improve the responsiveness of the Web Site for our users, we may use "cookies", or similar electronic tools to collect information to assign each visitor a unique, random number as a User Identification (User ID) to understand the user's individual interests using the identified computer. Unless you voluntarily identify yourself (through registration, for example), we will have no way of knowing who you are, even if we assign a cookie to your computer. The only personal information a cookie can contain is information you supply. A cookie cannot read data off your hard drive.

 

Clear GIFs

We may use "clear GIFs" (Web Beacons) to track the online usage patterns of our users in an anonymous manner, without personally identifying the user. We may also use clear GIFs in HTML-based emails sent to our users to track which emails are opened by recipients. We use this information to inter-alia deliver our web pages to you upon request, to tailor our Site or Service to the interests of our users, to measure traffic within our Web Site to improve the Web Site quality, functionality and interactivity and understand the geographic locations from where our visitors come.

 

Information Sharing

The Company shares your information with any third party without obtaining the prior consent of the User in the following limited circumstances:
a) When it is requested or required by law or by any court or governmental agency or authority to disclose, for the purpose of verification of identity, or for the prevention, detection, investigation including cyber incidents, or for prosecution and punishment of offences. These disclosures are made in good faith and belief that such disclosure is reasonably necessary for enforcing these Terms or for complying with the applicable laws and regulations.
b) The Company proposes to share such information within its group companies and officers and employees of such group companies for the purpose of processing personal information on its behalf. We also ensure that these recipients of such information agree to process such information based on our instructions and in compliance with this Privacy Policy and any other appropriate confidentiality and security measures.

 

Information Security

We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data. All information gathered on TIL is securely stored within the Company controlled database. The database is stored on servers secured behind a firewall; access to the servers is password-protected and is strictly limited. However, as effective as our security measures are, no security system is impenetrable. We cannot guarantee the security of our database, nor can we guarantee that information you supply will not be intercepted while being transmitted to us over the Internet.

 

Updates / Changes

The internet is an ever evolving medium. We may alter our privacy policy from time to time to incorporate necessary changes in technology, applicable law or any other variant. In any case, we reserve the right to change (at any point of time) the terms of this Privacy Policy or the Terms of Use.

 

Your Concerns

If you have any concerns, please contact info@fosteracademics.com.

Thank you for visiting our site