Privacy Policy

Kartgrab is focused on your protection. The accompanying security arrangement subtle elements how we use your own recognizing data. This protection strategy might be changed whenever without notice to you and spreads the use of your own data by every last business possessed and worked by Tech Support. Your own recognizing data might be put away or used by all organizations under the Tech Support penumbra however dependably inside the terms and states of this security strategy.

Our security approach regards and perceives your entitlement to classification and is focused on ensuring the protection of the guests to its.Kartgrab is the sole proprietor of the data gathered .We won't give, lease, advance, or pitch any identifiable individual data to some other outsider, unless legitimately required to do as such. The data is gathered from clients at different distinctive focuses on our site

Personal Details

Before utilizing the Kartgrab Service, the client should first entire the enrollment shape. This includes giving client contact data, for example, First and Last name, E-mail address, Postal address, and so on. Kartgrab will utilize your contact subtle elements to reach you with respect to the item or potentially benefits you have asked. This comprises of reestablishment/re-enrollment warnings, exceptional offers, and overviews on enhancing our administration.

Payment Details

In the event that an user purchases a plan from Tech Support, we will accumulate credit cards information, and other repayment information required to complete a payment from the consumer. Technology Support may use a 3rd party to process and verify credit credit cards for billing purposes. This kind of entails sharing an individual name, credit card number, termination date and billing address with the credit greeting card processing company. When digesting a payment transaction, Kartgrab will also obtain information about the amount of the payment and other transaction data.

Computer System Information

1. Subscriber Computer - We may also seek information related to your computer. This may include: information about the make and model of your computer and/or any computer hardware, software or peripherals attached to it, date of purchase and type of computer, identification number of your computer, condition of the computer and the application if reporting a fault occurrence and during diagnostics, system and registry data about software installations and hardware configurations, and error tracking files. Generally, this information is required to offer personalized device support to you, and to help us update our support tools and augment our supported products list.

2. Offsite Access - While requesting support you may request for the problem to be resolved by taking control of your computer. Tech Support uses qualified utilities that allow users to grant control of user computer to an Expert offsite over the Internet, so that the Expert can diagnose or correct problems. Experts are not allowed to use the Offsite Access software until and unless they have received adequate training in its use, and user have consented to grant control. Furthermore, Experts will not use Offsite Access tools to collect sensitive or confidential information stored on user computer or network, deliberately destroy information on user computer or network, or cause user to experience system problems.

3. Diagnostic Tools - Some Tech Support online diagnostic applications may gather a broad variety of functional information about the state of a computer system and the applications on it. This information is packaged into a document containing all the essential details needed by Tech Support and is transmitted securely over the Internet to the Tech Support server. Tech Support analyzes this information to help diagnose and solve end-user problems. Information collected by the Tech Support application will not contain any sensitive information such as e-mail messages, e-mail addresses sent to, passwords, profiles, websites visited, etc. Use of the Offsite Access and Diagnostic applications is also subject to the terms of use in the respective software license agreements.

Information Security

All data accumulated on our site is put away and kept up in secure offices that restrain access to approved staff as it were. The Tech Support site is frequently tried for security breaks to guarantee that all data gathered is secure from unapproved review and sharing. Individual data of our clients is ensured in travel by means of HTTPS and SSL security.

Retention of Information

Master Live Support will hold the individual data of its clients for whatever length of time that they are enrolled endorsers or clients of our items, and for a sensible time from that point.


A treat is a message given to a web program by a web server. The program stores the message in a content document. The principle thought of treats is to distinguish clients and potentially plan tweaked website pages for them. Utilization of a treat is not the slightest bit connected to any by and by identifiable data while on our site and can't abuse the security of our clients.

Live Help Session Records

Kartgrab claims all authority to screen on-line and disconnected sessions between a client and a TECH Support Executive for quality control of the administration gave to the client by the Tech Support Executive. In addition, we may record on-line and disconnected sessions led on the Web webpage for client reference and to aid determination of question as well as potential protestations. The session records will likewise be utilized to enhance the administration, construct a help learning base, as well as direct inward statistical surveying. Session record information will, in any case, not be related with by and by identifiable information about individual clients.

Log Files

We utilize IP delivers to break down patterns, track client development, direct the site, and assemble wide statistic data for total utilize. IP delivers are not connected to by and by identifiable data.


We will share aggregated demographic information with our partners and advertisers. This is not linked to any personal information that can identify any individual person.

Contests and Surveys

Every once in a while our site demands data from clients through reviews or challenges. Cooperation in these overviews or challenges is totally deliberate and the client consequently, has a decision regardless of whether to unveil this data. Data asked for may incorporate contact data, for example, name and delivering location, and statistic data, for example, postal division. Contact data will be utilized to tell the champs and honor prizes. Overview data will be utilized for reasons for checking or enhancing the utilization and fulfillment of this site.

Auxiliary Information

All together for this site to appropriately fulfill its commitment to our clients, it is important for us to supplement the data we get with data from outsider sources.

1. Special Offers – We send every single new client an appreciated email to confirm secret word and logon name. Existing and past clients will incidentally get data on items, administrations, extraordinary arrangements, and bulletins.

2. Correction/Updating of Personal Information – User's by and by identifiable data changes, (for example, client postal division), or if User never again wants the Service, we will attempt to give an approach to right, refresh or evacuate User individual information gave to us. This should be possible at the Profile page.

3. Notification of Changes – Tech Support claims the total authority to refresh this Privacy Policy whenever by posting changes online with no notice to you. It is your duty to allude to this Privacy Policy before presenting any data on the site. Presenting your data after such changes to the Privacy Policy constitutes acknowledgment of those posted changes. On the off chance that anytime we utilize actually identifiable data in a way not quite the same as that expressed at the time it was gathered, we will inform client by means of email. We will utilize data as per the security approach under which the data was gathered. Kindly get in touch with us in the event that you have any inquiries, remarks or worries about this security strategy.