Mechamath collects information that has been voluntarily provided by the user to the Service, such as the information we collect when the user registers an account: name, email address, etc.
In addition, we may receive certain types of anonymous information each time you interact with the Service. This information can include the user’s IP address, server domain, and browser type. This information helps us analyze trends and administer the site. This information is anonymous and does not contain personally identifiable information.
Use of Ezoic
This website uses a third party technology called Ezoic, which is a certified publishing partner of Google. Their services include monetization through the use of ads, tools to improve site speed, and SEO and analytics tools.
- We do not collect personal information unless necessary (for example, if you choose to create an account).
- We do not share your personal information except to comply with the law.
The use of a cookie is in no way linked to any personally identifiable information about you. All personal information is collected only when you voluntarily provide it, such as providing your email address to create an account.
If you wish to disable cookies, you can do so through your browser’s individual options. More detailed information about managing cookies with specific web browsers can be found on the respective browsers websites.
- Disable cookies on Chrome
- Disable cookies on Firefox
- Disable cookies on Safari
- Disable cookies on Microsoft Edge
Links to third party websites
Our website may contain hyperlinks to third party pages or resources, or other websites may contain hyperlinks to our website. These other sites are not under the control of Mechamath. Mechamath will not be responsible for the collection, use or disclosure of data collected through such third party web pages, and we expressly disclaim any liability related to such collection, use or disclosure. We recommend that you read the privacy policies of other websites you visit.
We seek to protect your personal information using appropriate technical and organizational measures based on the type of personal information and the type of activity. For example, we encrypt all information in transit and maintain all security patched services in a timely manner.