Last updated : October 10, 2020
GPOINTMARKET (“GPoint Market,” “Us,” “Our,” or “We”) and its subsidiary and affiliate companies respect and honor the privacy rights of it’s
online customers (“you,” “your,” or “yours”) and recognize the importance of protecting the information collected about them.
GPOINTMARKET (“we”) operates the Web Site located at www.gpointmarket.com (the “Web Site”).
Information is collected, shared, and used.
We may collect information about you anytime you interact with us such as when you:
1. Access or browse the website
2. Order products through the web site.
3. Communicate with us either by e-mail or telephone or in any other manner.
4. Choose to participate in any of our product promotions.
5. Request information about products.
We collect personally identifiable information and non-personally identifiable.
Personally identifiable information comprises any information that can help us identify or locate a customer an individual,
Including, without limitation, an individual’s name, address, e-mail address, telephone number and credit card number.
Non-personally identifiable information comprises information that does not by itself identify an individual.
This information generally includes anonymous information about an individual’s use of the Website that includes, among
Other things, information concerning date and time of the visit, the pages of the website visited, the path through the website,
IP address, the type of browser and operating system used.
We use your information in the following ways:
1. To personalize your experience.
2. To improve the website.
3. To improve customer service
4. To process transactions
5. To send periodic emails
We use a variety of security measures to maintain the safety of your personal information when you place an order or access
your personal information. We offer the use of a secure server. All supplied sensitive/credit information is transmitted via
Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway providers database only to be accessible by
those authorized with special access rights to such systems, and are required to keep the information confidential.