Transparency

Privacy Policy

At The Indian Post Live, we value the trust our readers place in us. This policy outlines how we protect your information in accordance with modern digital safety standards.

Last Updated: December 2025

1. Information We Collect

When you interact with our portal, we collect two types of data:

  • Personal Information: Voluntarily provided names, emails, and feedback messages.
  • Non-Personal Information: Automated data including IP address, browser type, and time spent on specific news articles.

2. How We Use Your Information

Your data is utilized to enhance the quality of our journalism and the efficiency of our portal. We operate under a strict No-Sale policy: your data is never sold, rented, or traded to third-party marketers.

User Accessibility

We analyze non-personal data to improve site navigation, optimize load times, and ensure accessibility for all users.

Service Communications

To ensure account security and record-keeping, we send automated email confirmations for every key action.

Portal ActionSystem Response
Login & RegistrationVerification Sent
Feedback & ComplaintsAcknowledgment Sent
Newsletter SubscriptionWelcome Mail Sent

Note: These emails are essential for the integrity of user actions. While you can unsubscribe from newsletters, core service alerts (like security logs) are mandatory for your protection.

3. Editorial Desk & CMS Processing

Journalistic Integrity & Access Control

News tips, whistleblower information, and reader communications are stored within our high-security Encrypted Content Management System (CMS).

Token-Based Auth

Every staff member must authenticate via a unique Secure Token.

Role-Based Access

Staff are assigned specific roles; the system validates permissions per role.

API Authorization

All internal API requests undergo mandatory authorization checks at every endpoint.

4. Advanced Data Security

Encrypted Transit

SSL/TLS encryption for all data.

Token Auth

Preventing unauthorized entry.

Encrypted Storage

Data stored in secure databases.