Privacy Policy


Privacy Policy for Mashaal News (www.mashaalnews.com)

Effective Date: July 2,2023

  1. Introduction

Welcome to the Privacy Policy of Mashaal News. This policy describes how we collect, use, store, and protect the information you provide to us when you visit our website, www.mashaalnews.com. We are committed to protecting your privacy and ensuring the security of your personal information. By accessing and using our website, you agree to the practices described in this Privacy Policy.

  1. Information We Collect

2.1 Personal Information

When you visit our website, we may collect personal information that you voluntarily provide to us. This information may include your name, email address, postal address, phone number, and other contact details. We collect this information when you subscribe to our newsletter, create an account, participate in surveys or contests, or engage in other activities on our website.

2.2 Log Data

In addition to personal information, our servers automatically collect certain information known as log data. This data includes your IP address, browser type, operating system, referring/exit pages, clickstream data, and other details about your interactions with our website. Log data is collected for analytical purposes, to track user activity, and to improve our website’s functionality and performance.

2.3 Cookies and Similar Technologies

We use cookies, web beacons, and other similar technologies to enhance your browsing experience and collect certain information. Cookies are small text files that are stored on your device when you visit our website. They allow us to remember your preferences, analyze trends, track user activity, and improve the overall user experience. You can control the use of cookies through your browser settings.

  1. Use of Collected Information

3.1 Personal Information

We may use the personal information we collect to communicate with you, provide you with our services, respond to your inquiries, send you newsletters or promotional materials, and improve our website and services. We may also use your personal information to personalize your experience on our website and deliver content that is relevant to your interests.

3.2 Log Data

The log data we collect is used to analyze trends, administer the website, track user movements, and gather demographic information for aggregate use. This information helps us improve our website, diagnose technical problems, and ensure the security of our systems.

3.3 Cookies and Similar Technologies

Cookies and similar technologies allow us to customize your browsing experience, understand your preferences, and deliver relevant content and advertisements. We may use cookies for website analytics and to measure the effectiveness of our advertising campaigns.

  1. Sharing of Information

4.1 Third-Party Service Providers

We may share your personal information with trusted third-party service providers who assist us in operating our website, conducting business, or providing services to you. These providers are obligated to protect your information and may only use it for the purposes specified by us. Examples of such third-party service providers include hosting companies, email service providers, and analytics platforms.

4.2 Legal Requirements

We may disclose your personal information if required to do so by law or in response to valid legal requests, such as court orders or government regulations. We may also disclose your information to enforce our Terms of Service or protect our rights, property, or safety, as well as the rights, property, or safety of others.

4.3 Business Transfers

In the event of a merger, acquisition, or sale of our assets, your personal information may be transferred to the acquiring entity or third party as part of the transaction. We will notify you and seek your consent if your personal information is subject to a different privacy policy.

  1. Data Security

We take reasonable measures to protect the security and integrity of your personal information. We use industry-standard security techniques, such as encryption, secure socket.