International Journal of Emerging Knowledge Studies is committed to protecting the privacy of its website visitors, users, and authors. We have implemented the following guidelines to ensure the privacy and security of personal information. We reserve the right to update these guidelines as needed, with changes posted on the website. Users will not receive direct notification of such changes.
Information We Collect
The information we collect depends on how users interact with the International Journal of Emerging Knowledge Studies website. We may collect non-personally identifiable information, such as your browser type, operating system, and domain name of your Internet Service Provider. In certain cases, we may collect personally identifiable information when you voluntarily provide it through forms or communications with us.
Use of Information
International Journal of Emerging Knowledge Studies does not share, rent, or sell your personal information to third parties, except as required to provide the services or products you have requested or with your explicit permission. We use personal information in ways that are consistent with its intended use, such as:
- Enabling your access to the website.
- Responding to inquiries and providing customer support.
- Managing the site and improving its functionality.
- Enhancing the journal’s design and user experience.
- Enforcing our Terms and Conditions of Use.
Legal Requirements
We may share personal information when we believe it is necessary to investigate, prevent, or take action regarding potential fraud, illegal activities, or threats to the safety of individuals, or as required by law.
External Links
Our website may contain links to external websites, but we are not responsible for their data collection or privacy practices. We encourage users to review the privacy policies of external sites, as this policy only applies to International Journal of Emerging Knowledge Studies.
Security
We are dedicated to ensuring the security of your personal information. To prevent unauthorized access or disclosure, we employ robust physical, electronic, and managerial procedures. These include:
- Limiting access to personal data only to authorized personnel.
- Storing data in secure computing environments protected by firewalls and high-security systems.
- Using Secure Sockets Layer (SSL) encryption technology with 256-bit RSA encryption to protect the transmission of sensitive information between your computer and our systems.