privacy and policy

GEMFOLLOWER emphasizes the principles of information protection and privacy of users of this site. This document contains an explanation of the private information and how to use this information that GEMFOLLOWER collects from users of the site. This information includes items that are specific to each user and can be used to uniquely identify users. Examples include first and last name, address, e-mail address, telephone number and other information that is not normally available to the public.

Collected information and how to use them

By registering in GEMFOLLOWER, you provide us with your details such as name, email and other items. To continue working on the site and request to place an order, you will need to add your address details and contact numbers.

Once you enter the site, you will be recognized as a user and all such information and information such as transactions, payments and your personal information will be at the disposal of the management. It should be noted that this information is not the only thing that the site will maintain.

It will also store information such as your IP, cookie information and the pages you view. Such information will only be used for advertising or content tailored to you and will not be made available to organizations and individuals other than Pickel.

GEMFOLLOWER will not lease your information unless you have violated the terms and conditions set forth in the Terms and Conditions and there is a legal complaint against your performance.

Edit and change personal information

You can change and edit all your personal information in the My Account section. This information includes all the information you have entered on our site; But your account cannot be removed from the system by you and will only be possible by management.

Restrictions on access to information

GEMFOLLOWER restricts its employees ‘access to users’ information, and only employees who have direct contact with users will have access to the information.

All passwords are stored in encrypted databases. In the encryption process, most efforts have been made to use advanced algorithms and methods.

We hope that by observing the maximum amount in protecting your information, ‌ we have given the necessary reassurance to you, dear customers, in using the sales system. If you have any questions or concerns, share your request by phone or through the Contact Us section.