Coming Soon!! Get up to 50% off on Bigger Library Plan!

Privacy Policy

It is important that you read our Privacy Policy, so that you fully understand the terms involved in your subscribing to our service, and how we use the personal information you submit. As we update and expand our services, this policy may change, so we recommend that you refer to it periodically.

The company providing the online booking of library membership plan is strongly committed in protecting the privacy of our valued subscribers. This privacy policy document contains information which you should go through so that you fully understand the terms involved in your subscribing to our varied services, and how we use the personal information shared by you to avail the various irresistible library services on PAN India basis.

For additional information, please e-mail us at

Security is a highly secured platform and has undergone penetration testing from a reputed agency. Our information security management framework provides robust controls for data encryption, data backups, server hardening, intrusion detection, patch management, protection against cross scripting, SQL injection attacks, etc.

Accepted Use

We will not use data for unlawful activities (such as child pornography, gambling, fraud, terrorist activities), sending unsolicited emails, for posting any material or transmitting any content that harasses, threatens the health and safety of our users or for posting any obscene, racist, indecent, malicious, harmful or violent content.


We store passwords in encrypted form.

Access Control

Only authorized persons can access data and all access are based on the principle of least privilege i.e. access is based on the user role and no access is given beyond what the role demands.

Information Security Organization

We have an information security and risk management committee headed by our CEO and with an independent board oversight.

Data Backup

Data is backed up on a daily basis. All backups are protected by either 256 bit AES encryption (Symmetric) or 2048 bit RSA (Asymmetric) encryption.

Confidentiality and Non-disclosure

We sign confidentiality and non-disclosure agreements with all our customers. Also, all our employees sign confidentiality and non-disclosure agreements in the interest of all.

Employee Background Verification and Screening

We do not perform background verification as a policy. We often verify references, KYC proofs and make sure that potential team members fit our company values.

Data Encryption

We deploy robust encryption techniques in order to secure legally/contractually restricted data (i.e. sensitive data). The encryption plan covers emails, desktop/laptop file systems, external storage media, data backups, transport level encryption and others.

Patch Management

Our information technology assets (software, servers, desktops, and laptop computers owned and operated by are properly patched with the latest appropriate updates in order to reduce system vulnerability and to enhance and repair application functionality.

Server Hardening

We harden our operating system, application, database, web servers towards any unauthorized attacks.

Cross Scripting and SQL Injections

Our technology stack, platform and code base are designed and deployed to prevent cross-scripting and SQL injection attacks.

Data Testing

We do not use user data in our testing or development environment including § Uptime. We guarantee a 99.9% uptime of our systems except in the event of a natural disaster beyond our control.

Network and Application Level Redundancy

Network level redundancy is managed by our hosting provider, Software Technologies, an SSAE16 certified provider. Application level redundancy is managed in-house including § IP Restrictions. We only allow authorized IPs to connect to our systems to enhance the security system.

Ethics and Code of Conduct is a professionally running website and follows ethical business practices.

Penetration Testing

All our key applications have undergone penetration testing from a reputed agency.

Data Retention

We retain data for a period specified in the contracts with our customers and comply with customer specific requirements. Our systems are capable of selective and automatic purging of sensitive data.

Customer Protection

When you book online membership of library or access your account information, we offer the use of a secure server. The Secure Server Software (SSL) encrypts all information you input before it is sent to us. Furthermore, all of the customer data we collect is protected against unauthorized access.

Use of Cookies

"Cookies" are small pieces of information that are stored by your browser on your computer's hard drive. Our cookies do not contain any personally identifying information, but they do enable us to provide features such as storing items in your order between visits. Most Web browsers automatically accept cookies, but you can usually change your browser to prevent that.

Change to the policy

We may make changes to this policy as and when needed. You should check back for updates to this policy from time to time. The privacy policy can be viewed any time by visiting the Privacy Policy page on website. We strive towards offering the guaranteed contented services.