Skip to main content

Privacy Policy

medicinehack.com 
Privacy Policy
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website or app?

When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address or other details to help you with your experience.

When do we collect information?

We collect information from you when you subscribe to a newsletter, fill out a form or enter information on our site.


How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

      • To personalize user's experience and to allow us to deliver the type of content and product offerings in which you are most interested.
      • To improve our website in order to better serve you.
      • To allow us to better service you in responding to your customer service requests.
      • To send periodic emails regarding your order or other products and services.

How do we protect visitor information?

Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.

We use regular Malware Scanning.

We do not use an SSL certificate
      • We only provide articles and information, we never ask for personal or private information like email addresses, or credit card numbers.

Do we use 'cookies'?

Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.

We use cookies to:
      • Help remember and process the items in the shopping cart.
      • Understand and save user's preferences for future visits.
      • Keep track of advertisements.
      • Compile aggregate data about site traffic and site interactions in order to offer better site experiences and tools in the future. We may also use trusted third party services that track this information on our behalf.

You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.

If you disable cookies off, some features will be disabled It won't affect the users experience that make your site experience more efficient and some of our services will not function properly.

However, you can still place orders .


Third Party Disclosure

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide you with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others' rights, property, or safety.

However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

Third party links

Occasionally, at our discretion, we may include or offer third party products or services on our website. These third party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.

Google

Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en

We use Google AdSense Advertising on our website.

Google, as a third party vendor, uses cookies to serve ads on our site. Google's use of the DART cookie enables it to serve ads to our users based on their visit to our site and other sites on the Internet. Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy.

We have implemented the following:
      • Remarketing with Google AdSense
      • Google Display Network Impression Reporting
      • Demographics and Interests Reporting

We along with third-party vendors, such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions, and other ad service functions as they relate to our website.

Opting out:
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising initiative opt out page or permanently using the Google Analytics Opt Out Browser add on.

California Online Privacy Protection Act

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law's reach stretches well beyond California to require a person or company in the United States (and conceivably the world) that operates websites collecting personally identifiable information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals with whom it is being shared, and to comply with this policy. - See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf

According to CalOPPA we agree to the following:
Users can visit our site anonymously
Once this privacy policy is created, we will add a link to it on our home page, or as a minimum on the first significant page after entering our website.
Our Privacy Policy link includes the word 'Privacy', and can be easily be found on the page specified above.

Users will be notified of any privacy policy changes:
      • On our Privacy Policy Page
Users are able to change their personal information:
      • By emailing us

How does our site handle do not track signals?
We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third party behavioral tracking?
It's also important to note that we allow third party behavioral tracking

COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.

We do not specifically market to children under 13.

Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email
      • Within 7 business days
We will notify the users via in site notification
      • Within 7 business days

We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.

CAN SPAM Act

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:
      • Send information, respond to inquiries, and/or other requests or questions.

To be accordance with CANSPAM we agree to the following:
      • NOT use false, or misleading subjects or email addresses
      • Identify the message as an advertisement in some reasonable way
      • Include the physical address of our business or site headquarters
      • Monitor third party email marketing services for compliance, if one is used.
      • Honor opt-out/unsubscribe requests quickly
      • Allow users to unsubscribe by using the link at the bottom of each email

If at any time you would like to unsubscribe from receiving future emails, you can
Email us atcoolhospital@gmail.com and we will promptly remove you from ALL correspondence.


Contacting Us

If there are any questions regarding this privacy policy you may contact us using the information below.

medicinehack.com
coolhospital@gmail.com
medicinehackteam@gmail.com

Last Edited on 6 September 2015

Comments

Popular posts from this blog

Hypokalemia - Potassium replacement calculation

 DEFINITION  Hypokalemia is defined as a serum potassium level of less than 3.5 mmol/L. Normal level= 3.5-5.5 mmol/L. It is encountered in >20% of patients. Patients are usually asymptomatic but severe arrhythmias and rhabdomyolysis can occur. Non-specific complaints include easy fatiguability and skeletal muscle weakness. The preferred method of replacement is via the oral route but at times this is not possible. The article below will give you an idea about how to calculate the amount of KCl to be given I.V. 1) Potassium deficit in mmol is calculated as given below: K deficit  (mmol) = (K normal lower limit  - K measured ) x kg body weight x 0.4 2) Daily potassium requirement is around 1 mmol/Kg body weight. 3) 13.4 mmol of potassium found in 1 g KCl . ( molecular weight KCl = 39.1 + 35.5 = 74.6) Suppose we get an asymptomatic patient of  70 Kg with a serum potassium level of 3.0 mmol/L and he is on nil by mouth but having...

Endomysium, Perimysium and epimysium - definition, histology

Each muscle fibre is closely surrounded by connective tissue. This acts as a support for the muscle fibres and unites them to each other. 1) Each muscle fibres is surrounded by delicate connective tissue that is called the endomysium . 2) Individual fasciculi are enclosed by a stronger sheath of connective tissue called the perimysium . 3) The entire muscle is surrounded by connective tissue called the epimysium . This is illustrated by the schematic diagram below. 1= perimysium, 2= endomysium, 3= fasciculus. At the junction of a muscle with a tendon, the fibres of the endomysium, the perimysium and the epimysium become continuous with the fibres of the tendon. First published on: 27 December 2016

The plantar reflex - Babinski's sign

The plantar response is an important test to identify an upper motor neuron lesion.  PROCEDURE  To elicit it, the muscles of the lower limbs must be relaxed. The outer edge of the sole of the foot is stimulated by firmly scratching a blunt object like a key or a stick along it from the heel towards the little toe. This is what  Joseph Babinski did in the year 1896. He described the 'great toe sign' that year and then in 1903 the 'toe abduction or fan sign'. Nowadays, a final medial movement across the sole of the metatarsus is also done. i.e. we start at the heel to the little toe and finally arcing to the big toe. The final arcing movement is absent in the original Babinski plantar response test. Babinski sign refers to a combination of 'the great toe sign' and the 'fan sign'.  SIGNIFICANCE  The normal response is plantar flexion of the toes (down going) and they are drawn together. More precisely, there is flexion of the big toe and addu...

Edema - Definition, pathophysiology, causes, clinical features

 DEFINITION  Edema is an abnormal presence of excessive fluid in the interstitial space.  PATHOPHYSIOLOGY  The movement of water and low molecular weight solutes such as salts between the intravascular and interstitial spaces is controlled primarily by the opposing effect of vascular hydrostatic pressure and plasma colloid osmotic pressure. Normally the outflow of fluid from the arteriolar end of the microcirculation into the interstitium is nearly balanced by inflow at the venular end. A small residual amount of fluid may be left in the interstitium and is drained by the lymphatic vessels, ultimately returning to the bloodstream via the thoracic duct. Either increased capillary pressure, diminished colloid osmotic pressure or inadequate lymphatic drainage can result in an abnormally increased interstitial fluid i.e. edema. An abnormal increase in interstitial fluid within tissues is called edema, while fluid collections in the different body cavi...

Gram staining - Procedure, mechanism, explanation

 INTRODUCTION  The Gram stain was developed in 1884 by the Danish bacteriologist Hans Christian Gram. It is one of the most useful staining procedures because it classifies bacteria into two large groups:  1) gram-positive and  2) gram-negative.  PROCEDURE  1) A heat-fixed smear is flooded with a basic purple dye, usually crystal violet. Because the purple stain imparts its color to all cells, it is referred to as a primary stain . 2) After 1 minute, the crystal violet is drained off and washed with distilled water. The smear is then covered with Gram's iodine, a mordant or helper . When the iodine is washed off, both gram-positive and gram-negative bacteria appear dark violet or purple. 3) Next, the slide is washed with alcohol (95% ethanol) or an alcohol-acetone solution. This solution is a decolorizing agent which removes the purple from the cells of some species but not from others. When the procedure is carried out, the slide is held ...