At THELOSER, accessible from www.theloser.live, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by THELOSER and how we use it.

If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us our mail address is contactus.theloser@gmail.com

General Data Protection Regulation (GDPR)

We are a Data Controller of your information.
THELOSER legal basis for collecting and using the personal information described in this Privacy Policy depends on the Personal Information we collect and the specific context in which we collect the information:
• THELOSER needs to perform a contract with you
• You have given THELOSER permission to do so
• Processing your personal information is in THELOSER legitimate interests
• THELOSER needs to comply with the law
THELOSER will retain your personal information only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use your information to the extent necessary to comply with our legal obligations, resolve disputes, and enforce our policies.
If you are a resident of the European Economic Area (EEA), you have certain data protection rights. If you wish to be informed what Personal Information we hold about you and if you want it to be removed from our systems, please contact us.
India has followed the EU’s General Data Protection Regulation (GDPR) in allowing global digital companies to conduct business under certain conditions, instead of following the isolationist framework of Chinese regulation that prevents global players like Facebook and Google from operating within its borders. Yet, Indian DPB carries additional provisions beyond the EU regulation. Because India is a nation state, it would treat the data generated by its citizens as a national asset, store and guard it within national boundaries, and reserve the right to use that data to safeguard its defense and strategic interests.
There are a number of features of the DPB that will require companies to change their business models, practices, and principles. Many others will add operational costs and complexity. The issues we raise here serve as a primer for what businesses need to keep in mind about India’s new regulation and the increase in data protection regulation around the world. Understanding these issues will help digital companies plan ahead, address future regulations, and decide whether to enter or exit certain markets.
Privacy as a fundamental right: In 2017, the Supreme Court of India ruled that privacy is a constitutional right of Indian citizens. Every citizen, however, leaves a visible trail of private data while navigating in the digital world. DPB intends to protect and safeguard citizen’s privacy rights by controlling the collection, security, storage, sale, and exploitation of these data. New regulation would affect the cost-benefit analysis for many digital firms that often lose money in offering free services, but aim to earn profits from the sale and exploitation of customers’ personal data. Many of those digital firms would have to rethink their business models if they can no longer collect, exploit, retain, and sell user data as profitably as before.
User consent: DPB requires that a digital company must obtain explicit permission from a user before collecting their personal data. In doing so, it must explain the extent and the purpose of data collection. Explicit permission must also be obtained at each stage of subsequent data processing. Compliance with this provision could be tricky, because digital companies not only collect personal data, they also process that data to create new information that does not belong to the original user. For example, Uber ascertains traffic patterns and Amazon analyzes feedbacks from individual transactions. Furthermore, raw data could be transferred to a third-party data processor for analysis, creating new information in conjunction with the data received from other data collectors. Companies will have to rethink their operating procedures for data tracking and security as well as ascertain whether, when, and how to obtain user permissions. Digital companies now become “data fiduciaries” as defined in the DPB, instead of being mere data collectors, when they assume responsibility for obtaining user permission for both initial collection and subsequent processing of user data.
Ownership of personal data: In principle, DPB proposes that the data provider is the owner of their own personal data. While simple in idea, this notion could impose an enormous implementation burden for digital companies. In the physical world, a property owner can ask for return of their property. Companies in the digital world would have to figure out how to comply with this requirement when the user demands erasure or recall of their personal data from a digital company — for example, when a person requests deletion of all of their information after they cease to be a Facebook member. Digital companies would also have to think beyond their own data storage and usage, because they might have sold the data to a third party.
Three classes of data: DPB has identified three categories of data from which a principal can be identified: Sensitive data includes information on financials, health, sexual orientation, genetics, transgender status, caste, and religious belief. Critical data includes information that the government stipulates from time to time as extraordinarily important, such as military or national security data. The third is a general category, which is not defined but contains the remaining data. DPB prescribes specific requirements that data fiduciaries must follow for the storage and processing for each data class.
All sensitive and critical data must be stored in servers located in India. Sensitive data may be processed outside but must be brought back to India for storage. Critical data cannot be taken out of the country at all. There are no restrictions for general data. Digital companies currently operate in a seamless cyber world, where they mostly store and process their data wherever is economically most efficient. This locational divide proposed by DPB would impose additional costs on digital companies, might lead to subeconomic storage and processing capacities, and might result in what some refer to as “splinternet”or the fragmentation of global digital supply chains.
Data sovereignty: DPB reserves the right to access the locally stored data to protect national interests. This implies that DPB would treat citizens’ data as a national asset, no different than control over citizens’ physical properties. In this respect, DPB differs from GDPR, which imposes no locational storage requirements or preferential access to data for protecting national interests. Currently, digital companies practically own the data as long as they can address the privacy concerns and meet the user-acceptance requirements. One implication of the new policy is that when the government demands its citizens’ data, in case of foreign attacks and surveillance, digital companies would have to abide and assist the Indian government’s defense policy.
Verification tag: DPB requires that all digital companies must identify their users and tag them into three categories to reduce trolling (e.g., an anonymous user or a bot trying to incite violence by posting incendiary comments): Users who have verified their registration and display real names; users who have a verified registration but have kept their names anonymous; and users that have not verified registration. This would be a first regulation of its kind in global social media. This implies that digital companies must put in place procedures for collecting and verifying the real identities of their users. Note that Facebook has more that 100 million fake accounts and faces the dilemma of continuing as is, attempt to verify them, or delete those accounts.

In certain circumstances, you have the following data protection rights:
• The right to access, update or to delete the information we have on you.
• The right of rectification.
• The right to object.
• The right of restriction.
• The right to data portability
• The right to withdraw consent

Log Files

THELOSER follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services' analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information.

Cookies and Web Beacons

Like any other website, THELOSER uses 'cookies'. These cookies are used to store information including visitors' preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information.

For more general information on cookies, please read "What Are Cookies".

Google DoubleClick DART Cookie

Google is one of a third-party vendor on our site. It also uses cookies, known as DART cookies, to serve ads to our site visitors based upon their visit to www.website.com and other sites on the internet. However, visitors may choose to decline the use of DART cookies by visiting the Google ad and content network Privacy Policy at the following URL – https://policies.google.com/technologies/ads

Our Advertising Partners

Some of advertisers on our site may use cookies and web beacons. Our advertising partners are listed below. Each of our advertising partners has their own Privacy Policy for their policies on user data. For easier access, we hyperlinked to their Privacy Policies below.
• Google
https://policies.google.com/technologies/ads

Privacy Policies

You may consult this list to find the Privacy Policy for each of the advertising partners of THELOSER.
Third-party ad servers or ad networks uses technologies like cookies, JavaScript, or Web Beacons that are used in their respective advertisements and links that appear on THELOSER, which are sent directly to users' browser. They automatically receive your IP address when this occurs. These technologies are used to measure the effectiveness of their advertising campaigns and/or to personalize the advertising content that you see on websites that you visit.
Note that THELOSER has no access to or control over these cookies that are used by third-party advertisers.

Third Party Privacy Policies

THELOSER's Privacy Policy does not apply to other advertisers or websites. Thus, we are advising you to consult the respective Privacy Policies of these third-party ad servers for more detailed information. It may include their practices and instructions about how to opt-out of certain options.

You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers' respective websites.

Children's Information

Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.

THELOSER does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.

Online Privacy Policy Only

Our Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in THELOSER. This policy is not applicable to any information collected offline or via channels other than this website.

Consent

By using our website, you hereby consent to our Privacy Policy and agree to its terms.