International Conference On Electrical Electronics Engineering Technology follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting company does this and a part of hosting services analytics. The news collected by log files includes IP(internet protocol) address, browser type, ISP(Internet Service Provider), date and time stamp. These are not linked to any information/news that is personally identifiable. The intention of the news is for analyzing trends, administering the site, tracking users’ movement on the website, and gathering demographic information.
Cookies and Web Beacons
Like any other website, International Conference On Electrical Electronics Engineering Technology uses ‘cookies’. These cookies are used to store information/news including visitors favor, and the pages on the website that the visitor accessed/visited. The information is used to optimize the user’s experience by customizing our web page content based on visitors browser type and other information.
Google DoubleClick DART Cookie
Our Advertising Partners
Note that International Conference On Electrical Electronics Engineering Technology has no access to or control over these cookies that are used by third-party advertisers.
Third-Party Privacy Policies
You can choose to disable cookies through your personal web browser options. To know more detailed information about cookie management with specific web browsers, it can be put at the browsers respective websites. What Are Cookies?
Another part of our priority is adding saving for children while using the internet. We encourage parents and guardians to observe, participate in, and guide their online activity.
International Conference On Electrical Electronics Engineering Technology does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information/news on our website, we strongly encourage you to contact us instantly and we will do our best efforts to instantaneously remove such information from our records.
Name and Address of the controller
Controller for the purposes of the General Data Protection Regulation (GDPR), other data protection laws applicable in Member states of the Bangladesh Union and other provisions related to data protection is:
376 Rangpur Engineering College Rangpur, Bangladesh
The data subject may, at any time, obstruct the setting of cookies through our website by means of a similar setting of the Internet browser used, and may thus permanently refuse the setting of cookies. Also, already set cookies may be deleted at every time via an Internet browser or other software programs. This is possible in all popular Internet browsers. If the data subject deactivates the setting of cookies in the Internet browser used, not all functions of our website may be completely usable.
Comments function in the blog on the website
The website offers users the possibility to leave personal comments on individual blog contributions on a blog, which is on the website of the controller. A blog is a web-based, publicly-accessible gateway, through which one or more people known as bloggers may post articles or write down thoughts in so also known as blog-posts. Blog-posts may generally be commented on by third parties.
If a data subject leaves a comment on the blog revealed on this website, the comments created by the information subject are also stored and published, as well as information on the date of the explanation and on the user’s chosen by the data subject. Also, the IP address assigned by the Internet service provider (ISP) to the data subject is also logged. This storage of the IP address takes place for security causes, and in case the data subject violates the rights of third parties or posts forbidden content through a given comment. The storage of these personal data is, So, in the own interest of the data controller, so that he can exonerate in the event of an contravention. This collected personal data will not be passed to third parties if not such a transfer is required by law the aim of the defense of the data controller.