Privacy Policy

Thanks for Visiting the gplbucket.in the Privacy Policy page, We propose you check out the privacy policy of our site to be aware of the fact that what happens to your personal information when you visit our website. To know more in detail regarding the matter of data protection, we recommend you to go through our privacy policy briefly.

Who we are ?

Our website address is: https://gplbucket.in/

Here on this website, you will find GPL themes and plugins, you can download these themes and plugins to use on your website.

All the themes are owned by third-party developers, we are not the owner of these themes and plugins. we are selling these products under GPL license.

What kind of information do we collect from you?

Information is gathered from you when you give it to us. We gather information from you when you register on our site, put in a request, buy our subscription plan, or try to reach out to us via our contact form with your data. The information that we gather incorporates the name, address, email address, and contact number of an information subject will reliably be as per the General Data Protection Regulation (GDPR), and according to the country-specific data protection guidelines that are pertinent to the site of GPLBucket. However, one can visit our site namelessly too.

Reason for Data Collection

The information and data that we gather from our site visitors are utilized by us for the reasons recorded below:

  • To enhance customer service.
  • To administer a contest, promotion, survey, or other site feature.
  • To personalize visitor’s experience.
  • To send periodic emails.

Definitions of Different Terms:

Restriction of Processing: Restriction of processing refers to the restriction applied to the personal data and information that is stored to restrict their processing in the future.

Data Subject: A data subject is any identified or identifiable human being. The personal data and information of the data subject are processed by the controller who is solely responsible for the processing of the data.

Pseudonymization: Pseudonymisation is the handling of a person’s data in such a manner, that the person’s data can never again be attributed to a specific information subject without the utilization of extra information or data, given that such extra data is kept independently and is dependent upon specialized and definitive measures to ensure that the person’s data isn’t credited to an identified or identifiable natural individual.

Individual Data: By referencing individual data and information, we are referring to the information or data that has a place with a distinguished or recognizable authentic individual that is the “Information Subject”. A recognizable natural individual can be recognized, truly or in another way, explicitly by reference to an identifier, for instance, a name, an ID number, area data, an online identifier, or to at least one element unequivocal to their physical, physiological, innate, mental, money related, the social or social character of that common person.

Processor: The processor is a common or legal individual, public authority, agency, or any other body that is responsible for processing the personal data on behalf of the controller.

Recipient: The Recipient is a common individual or legitimate individual, public power, organization, or another body, to which the individual data and information are uncovered, whether or not a third party. Notwithstanding, public specialists who may get individual data in the arrangement of a particular request according to Union or Member State law won’t be considered as the recipient; the processing of that data by those public specialists will be consistent with the relevant information assurance administers as indicated by the objective of processing.

Profiling: Profiling suggests a robotized processing process of individual information and data containing the utilization of individual data to survey certain individual viewpoints related to a characteristic individual, explicitly to research or predict concerning that common individual’s performance at work, monetary circumstance, well-being, individual preferences, interests, reliability, behavior, location or movements.

Third-party: The third party is a common or legal individual, public authority, agency, or anybody other than the data subject, controller, processor, and persons who are under the direct authority of the controller or processor and are authorized to process the personal data of an individual.

Controller: The controller obligated for the processing of data, Controller or regulator at risk for the handling is the ordinary or authentic individual, public power, organization, or other body which, alone or mutually with others, decides the reasons and methods for the processing of individual’s data and information directed by Union or Member State law, the regulator or the specific standards for its assignment may be obliged by Union or Member State law.

Consent: Consent of the information subject is any straightforwardly given, express, educated, and unambiguous indication of the information subject’s cravings by which the individual whether the individual in question, by a declaration, or by the reasonable governmental policy regarding minorities in society, suggests the full consent to the handling of person’s information and data relating to that individual.

Name and Address of the Controller

Controller for the General Data Protection Regulation (GDPR), other data protection laws applicable in Member states are:

  • GPLBucket
  • Email: support@gplbucket.in
  • Website: https://gplbucket.in/

Collection of General Data and Information

The site accumulates a progression of general information and data when an information subject or robotized framework calls up the site. This overall information and data are put away in the worker log documents. Gathered might be (1) the browser types and versions utilized, (2) the operating system used by the accessing system, (3) the website from which an accessing system reaches our website (so-called referrers), (4) the sub-websites, (5) the date and time of access to the Internet site, (6) an Internet protocol address (IP address), (7) the Internet service provider of the accessing system, and (8) any other similar data and information that may be used in the event of attacks on our information technology framework.

When utilizing this overall basic information and data, the site doesn’t make any determinations about the information subject. Instead of this, the data is expected to (1) convey the substance of our site precisely, (2) streamline the substance of our site just as its promotion, (3) ensure the long-term viability of our information technology systems and website technology, and (4) furnish law implementation specialists with the data critical for criminal arraignment regardless of a digital assault. Thus, the GPLBucket examines anonymously gathered information and data measurably, to improve the information assurance and information security of our undertaking, and to ensure an ideal degree of protection for the individual information we measure. The unknown information of the server log files is stored separately from all close-to-home information given by an information subject.

Cookies

The Internet pages of the GPLBucket make use of Cookies. Cookies are the content documents that are stored in a System structure by methods for an Internet browser.

Various Internet sites and servers utilize Cookies. Various cookies contain a purported Cookie ID. A Cookie ID is an excellent identifier of the Cookie. It involves a character string through which Internet pages and servers can be consigned to the specific Internet program in which the cookie was stored. These licenses visited Internet sites and servers to separate the individual program of the information subject from other Internet programs that contain different cookies. A specific Internet program can be seen and recognized with the utilization of a unique cookie ID.

With the utilization of cookies, we can offer the users of this site easier-to-use services and that is preposterous without the cookie setting.

By the utilization of cookies, the information and offers on our site can be smoothed out by thinking about the clients. Cookies grant us, as of late referred to, to perceive our site users. The target behind this affirmation is to make it easier for users to utilize our site. The site that uses cookies, for instance, doesn’t have to enter access information each time they visit the site, considering the way that this is taken over by the site, and the cookie is subsequently taken care of on the client’s PC framework. Another example is the cookie of a shopping cart in an online store. The online store recollects the articles that customers have put in the virtual shopping cart using a cookie.

The information subject may confine or restrict the setting of cookies at whatever point they need through our site by methods for a related setting of the Internet program used, and may along these lines forever block the setting of cookies. Moreover, recently set cookies may be erased whenever by methods for an Internet program or other programming programs. This is possible in all standard Internet programs. If the information subject deactivates the setting of cookies in the Internet program used, not all components of our site may be by and altogether usable.

Registration at GPLBucket

The information subject has the probability to enlist on the site of the controller with the indication of individual information and data. Which individual data is communicated to the controller is directed by the specific information cover utilized for the selection. The individual information added by the information subject is assembled and stored just for internal use by the controller and for his objectives. The controller may request a move to at least one processor (for instance a parcel service) that moreover uses individual information for an interior owing to the controller.

By registering on the site of the controller, the IP address—allocated by the Internet service provider (ISP) and used by the information subject—date, and time of the registration is additionally stored. The capacity of this information happens against the foundation that this is the lone technique to avoid the misuse of our services, and, if essential, to make it conceivable to examine submitted offenses. So far, the storage of this information is pivotal to make sure about the controller. This information isn’t given to third parties except if there is a legal commitment to passing on the information, or if the transfer serves the objective of criminal prosecution.

The Registration of the information subject, with the purposeful indication of individual data, is proposed to engage the controller to offer the information subject content or service that may just be offered to selected clients in light of the idea of the issue alluded to. Enlisted Users are permitted to adjust the individual information decided during the enrollment at whatever point they need, or to have them erased from the information stock of the controller.

The data controller will, at any time, offer data upon a solicitation to every data subject with regards to what personal data are stored about the data subject. What’s more, the data controller will correct or delete personal data at the solicitation or indication of the data subject, to the extent that there are no legal stockpiling obligations. The aggregate of the controller’s employees is available to the data subject in this regard as a contact person.

Contact through the website

The site contains information that engages a quick electronic contact to our endeavor, similar to prompt correspondence with us, which moreover consolidates an overall location of the alleged electronic mail (email address). If the information subject contacts the regulator by email or through a contact structure, the individual information sent by the information subject is thus stored. Such personal data transmitted on a willful premise by a data subject to the data controller are stored with the target of preparing or arriving at the information subject. There is no exchange of this personal data to third parties.