Privacy Policy


At Tuhin Institute of Training, we understand the importance of protecting the privacy of our website visitors and users. This Privacy Policy outlines the types of information we collect, how we use it, and the measures we take to ensure its security. By accessing and using our website, you agree to the practices described in this policy.


Information Collection and Use: 

Personal Information: We may collect personal information, such as your name, email address, contact number, and other relevant details, when you voluntarily provide it to us through our website’s contact forms or when you communicate with us via email. We use this information solely for the purpose of responding to your inquiries and providing you with the requested services.


Log Files and Analytics: Like many websites, we gather certain non-personal information automatically and store it in log files. This information may include your IP address, browser type, operating system, referring/exit pages, and date/time stamps. We may also utilize web analytics tools to analyze trends, track user engagement, and improve our website’s performance.


Cookies and Tracking Technologies: We may use cookies and similar tracking technologies to enhance your browsing experience and collect information about how you interact with our website. Cookies are small text files stored on your device that help us recognize you and remember your preferences. You can modify your browser settings to decline cookies if you prefer, but this may limit certain features or functionality of our website.


Information Sharing and Disclosure: We do not sell, rent, or lease your personal information to third parties.


Service Providers: We may engage trusted third-party service providers who assist us in operating our website or providing requested services. These service providers are bound by confidentiality agreements and are only permitted to use your information to perform the specific tasks we assign them.


Legal Requirements: We may disclose your information if required to do so by law or in response to valid legal requests, such as court orders or government regulations.


Data Security: We implement appropriate security measures to protect your personal information from unauthorized access, alteration, disclosure, or destruction. However, please note that no method of transmission or storage is completely secure, and we cannot guarantee the absolute security of your data.


External Links: Our website may contain links to external websites that are not operated or controlled by us. We are not responsible for the privacy practices or content of these third-party websites. We encourage you to review their respective privacy policies when accessing them.


Content policies 

Illegal content:

We do not allow content that:

  • is illegal, promotes illegal activity, or infringes on the legal rights of others.   

Intellectual property abuse

We do not allow content that:

  • infringes copyright. It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (DMCA).
  • sells or promotes the sale of counterfeit products. Counterfeit goods contain a trademark or logo that is identical to or substantially indistinguishable from the trademark of another. They mimic the brand features of the product in an attempt to pass themselves off as a genuine product of the brand owner.


Dangerous or derogatory content

We do not allow content that:

  • incites hatred against, promotes discrimination of, or disparages an individual or group on the basis of their race or ethnic origin, religion, disability, age, nationality, veteran status, sexual orientation, gender, gender identity, or other characteristic that is associated with systemic discrimination or marginalization.


Examples: Promoting hate groups or hate group paraphernalia, encouraging others to believe that a person or group is inhuman, inferior, or worthy of being hated


  • harasses, intimidates, or bullies an individual or group of individuals.

Examples: Singling out someone for abuse or harassment, suggesting a tragic event did not happen or that victims or their families are actors or complicit in a cover-up of the event


  • threatens or advocates for physical or mental harm to oneself or others.

Examples: Content advocating suicide, anorexia, or other self-harm; threatening someone with real-life harm or calling for the attack of another person; promoting, glorifying, or condoning violence against others; content made by or in support of terrorist groups or transnational drug trafficking organizations, or content that promotes terrorist acts, including recruitment, or that celebrates attacks by transnational drug trafficking or terrorist organizations


  • exploits others through extortion.

Examples: Exploitative removals, revenge porn, blackmail


Animal cruelty

We do not allow content that:

  • promotes cruelty or gratuitous violence towards animals.

Examples: Promoting animal cruelty for entertainment purposes, such as cock or dog fighting

  • promotes the sale of products obtained from endangered or threatened species.

Examples: Sale of tigers, shark fins, elephant ivory, tiger skins, rhino horn, dolphin oil


Misrepresentative content/ Misleading representation

We do not allow content that:

  • misrepresents, misstates, or conceals information about us, the content creator, the purpose of the content, or the content itself.
  • falsely implies having an affiliation with, or endorsement by, another individual, organization, product, or service.

Examples: Impersonating Google products, misusing company logos.


Unreliable and harmful claims

We do not allow content that:

  • makes claims that are demonstrably false and could significantly undermine participation or trust in an electoral or democratic process.

Examples: information about public voting procedures, political candidate eligibility based on age or birthplace, election results, or census participation that contradicts official government records

  • promotes harmful health claims, or relates to a current, major health crisis and contradicts authoritative scientific consensus.

Examples: Anti-vaccine advocacy, denial of the existence of medical conditions such as AIDS or Covid-19, gay conversion therapy

  • contradicts authoritative scientific consensus on climate change.


Deceptive practices

We do not allow:

  • enticing users to engage with content under false or unclear pretenses.
  • attempting to steal personal information or trick users into sharing personal information

Example: Social engineering like phishing

  • promoting content, products, or services using false, dishonest, or deceptive claims.

Examples: “Get Rich Quick” schemes

  • coordinating with other sites or accounts and concealing or misrepresenting our identity or other material details about ourselves, where our content relates to politics, social issues or matters of public concern.
  • directing content about politics, social issues, or matters of public concern to users in a country other than our own, if we misrepresent or conceal our country of origin or other material details about ourselves.


Manipulated media

We do not allow content that:

  • deceives users through manipulated media related to politics, social issues, or matters of public concern.


Enabling dishonest behavior

We do not allow content that:

  • helps users to mislead others.

Examples: Creating fake or false documents such as passports, diplomas, or accreditation; sale or distribution of term papers, paper-writing or exam-taking services; information or products for passing drug tests

  • promotes any form of hacking or cracking and/or provides users with instructions, equipment, or software that tampers with or provides unauthorized access to devices, software, servers, or websites.

Examples: Pages or products that enable illegal access of cell phones and other communications or content delivery systems or devices; products or services that bypass copyright protection, including circumvention of digital rights management technologies; products that illegally descramble cable or satellite signals in order to get free services; pages that assist or enable users to download streaming videos if prohibited by the content provider

  • enables a user, or promotes products and services that enable a user, to track or monitor another person or their activities without their authorization.

Examples: Spyware and technology used for intimate partner surveillance including but not limited to spyware/malware that enables a user to monitor another person’s texts, phone calls, or browsing history; GPS trackers specifically marketed to spy or track someone without their consent; promotion of surveillance equipment (e.g. cameras, audio recorders, dash cams, nanny cams) marketed with the express purpose of spying

This does not include (a) private investigation services or (b) products or services designed for parents to track or monitor their underage children.


Sexually explicit content

We do not allow content that:

  • includes graphic sexual text, image, audio, video, or games.

Examples: Sex acts such as genital, anal, and/or oral sex; masturbation; cartoon porn or hentai; graphic nudity

  • contains non-consensual sexual themes, whether simulated or real.

Examples: Rape, incest, bestiality, necrophilia, snuff, lolita or teen-themed pornography, underage dating


Compensated sexual acts

We do not allow content that:

  • may be interpreted as promoting a sexual act in exchange for compensation.

Examples: Prostitution; companionship and escort services; intimate massage; cuddling sites; compensated dating or sexual arrangements where one participant is expected to provide money, gifts, financial support, mentorship, or other valuable benefits to another participant such as “Sugar” dating


Mail order brides

We do not allow content that:

  • facilitates marriage to a foreigner.

Examples: Mail order brides, international marriage brokers, romance tours


Adult themes in family content

We do not allow content that:

  • is made to appear appropriate for a family audience, but contains adult themes including sex, violence, or other depictions of children or popular children’s characters that are unsuitable for a general audience.


Child sexual abuse and exploitation

We do not allow content that:

  • Sexually exploits or abuses children or content that promotes the sexual exploitation or abuse of children. This includes all child sexual abuse materials.
  • Endangers children. Including but not limited to:

·        ‘Child grooming’ (for example, befriending a child online to facilitate, either online or offline, sexual contact and/or exchanging sexual imagery with that child);

·        ‘Sextortion’ (for example, threatening or blackmailing a child by using real or alleged access to a child’s intimate images);


·        Sexualization of a minor (for example, content that depicts, encourages or promotes the sexual abuse or exploitation of children); and

·        Trafficking of a child (for example, advertising or solicitation of a child for commercial sexual exploitation).


Behavioral policies 

Dishonest declarations

Information provided by us to enable our use of or interaction with Google advertising systems:

  • must be materially accurate and complete, without misleading omissions; and
  • cannot be expressed in a deceptive or misleading manner.

Examples: The personal information or payment details provided by us are materially incomplete, obscured or inaccurate. Information provided about a our website (e.g., in the ads.txt file) or app (e.g., in the app-ads.txt file) is inaccurate. Ad requests that contain partial or inaccurate URLs or AppIDs.


Ads interfering 

Google-served ads interfering with content or user interactions

We do not allow Google-served ads that:

  • overlay or are adjacent to navigational or other action items and may lead to unintended ad interactions,
  • severely interfere with consumption of content including overlaying the content or pushing the content off the display,
  • are placed on a “dead end” screen where the user is not able to exit the screen without clicking the ad. 


Inventory value

Google-served ads on screens without our-content

We do not allow Google-served ads on screens:

  • without our-content or with low-value content,
  • that are under construction,
  • that are used for alerts, navigation or other behavioral purposes


Out of context ads

We do not allow Google-served ads:

  • in apps or web pages that run in the background,
  • that appear outside the display,
  • when the user’s attention is expected to be elsewhere and not on the screen hosting the ad.


It must be clear to the user with which our-content the ad is associated.


Google-served ads on screens with replicated content

We do not allow Google-served ads on screens:

  • with embedded or copied content from others without additional commentary, curation, or otherwise adding value to that content.


We are comply with Google’s Intellectual property abuse policy.

More ads or paid promotional material than our-content

We do not allow Google-served ads on screens:

  • with more ads or other paid promotional material than our-content.


Unsupported languages

We do not allow content that:

  • is not primarily in one of the supported languages.

Privacy disclosures

We must:

  • have and abide by a privacy policy that clearly discloses any data collection, sharing and usage that takes place on any site, app, email publication or other property as a consequence of our use of Google products. The privacy policy must disclose to users that third parties may be placing and reading cookies on our users’ browsers, or using web beacons to collect information as a result of ad serving on our website.


Cookies on Google domains

We must:

  • not set a cookie on Google’s domains or modify, intercept or delete cookies set on Google’s domains.


Identifying users

We must:

  • not use device fingerprints or locally shared objects (e.g., Flash cookies, Browser Helper Objects, HTML5 local storage) other than HTTP cookies, or user-resettable mobile device identifiers designed for use in advertising
  • not pass any information to Google data that Google could use or recognize as personally identifiable information; or that permanently identifies a particular device (such as a mobile phone’s unique device identifier if such an identifier cannot be reset).
  • not use our services to identify users or facilitate the merging of personally identifiable information with information previously collected as non-personally identifiable information without robust notice of, and the user’s prior affirmative (i.e., opt-in) consent to, that identification or merger. Irrespective of users’ consent, we must not attempt to disaggregate data that Google reports in aggregate.


Use of device and location data

If we collect, process, or disclose information that identifies or can be used to infer an end user’s precise geographic location, such as sourced from GPS, wifi or cell tower data then,

We must:

  • disclose to the user, via an interstitial or just-in-time notice, the purposes for which their data may be used (including, ad personalization, analytics, and attribution, as applicable), including that the data may be shared with partners;
  • obtain express (i.e., opt-in) consent from end users before collecting, processing, or disclosing such information;
  • send such information to Google in an encrypted state or via an encrypted channel; and
  • disclose such information collection, processing, or disclosure in all applicable privacy policies.


Standard Contractual Clauses (SCCs)

Google relies on Standard Contractual Clauses (SCCs) for transfers of online advertising and measurement personal data out of Europe. For those services where Google acts as a processor, the Google Ads Data Processing Terms include, as necessary for the relevant data transfers, both the relevant SCCs issued by the European Commission (to help legitimize data transfers under the GDPR) and UK SCCs (to help legitimize data transfers under the GDPR as incorporated into UK law). Similarly, for those services where Google acts as a controller, the Google Ads Controller-Controller Data Protection Terms include, as necessary for the relevant data transfers, both the relevant European Commission-issued SCCs and UK SCCs. 


If partner processes personal data that originated in the European Economic Area, UK, or Switzerland and that is made available by Google in connection with partner’s use of Google Ad Manager, then:

  • partner must only use that personal data in a manner consistent with the consent provided by the data subject to whom it relates;
  • partner must provide a level of protection for that personal data that is at least equivalent to that required under the SCCs; and
  • if partner determines that it cannot comply with the above requirements, partner must notify Google in writing, and either cease processing the personal data or take reasonable and appropriate steps to remedy such non-compliance.


Children’s Online Privacy Protection Act (COPPA)

If we implement any Google advertising service on a site or section of a site that is covered by the Children’s Online Privacy Protection Act (COPPA), we must:

  • notify Google of those sites or sections of sites covered by COPPA using the Google Search Console, tag the ad request using the AdMob SDK , or tag wer site, app, or ad request for child-directed treatment;
  • do not use interest-based advertising (including remarketing) to target:

·        Past or current activity by users known by we to be under the age of 13 years or

·        Past or current activity on sites directed at users under the age of 13 years.


Requirements and other standards

Spam policies for Google web search: We must not place Google-served ads on pages that violate the Spam policies for Google web search.

Abusive experiences: We must not place Google-served ads on screens that contain abusive experiences.              

Malware or unwanted software

We must not:

  • place Google-served ads on screens that contain malicious software or “malware” that may harm or gain unauthorized access to a computer, device, or network.

Examples: Computer viruses, ransomware, worms, Trojan horses, rootkits, key loggers, dialers, spyware, rogue security software, and other malicious programs or apps

Examples: Failure to be transparent about the functionality that the software provides or the full implications of installing the software; failing to include Terms of Service or an End User License Agreement; bundling software or applications without the user’s knowledge; making system changes without the user’s consent; making it difficult for users to disable or uninstall the software; failing to properly use publicly available Google APIs when interacting with Google services or products


Better Ads Standards: We must not place Google-served ads on screens that do not conform to the Better Ads Standards.


Changes to the Policy:

We reserve the right to modify or update this Privacy Policy from time to time. Any changes will be posted on this page, and the “Last Updated” date at the bottom will reflect the date of the most recent revision. By continuing to use our website after any changes, you acknowledge and accept the updated Privacy Policy.


Contact Us: If you have any questions, concerns, or requests regarding this Privacy Policy or the handling of your personal information, please contact us at the following address:


Tuhinit Institute of Training

7th Floor, Shefaly Tower, Bindur Mor, Railgate, Rajshahi

Email:   Phone: 01711-141718

Last Updated: 21 May, 2023





Call Now Button