jennybhattwriter.com participates in affiliate marketing programs that pay a small commission when the products are purchased through links on the website.
jennybhattwriter.com does not collect any personal information unless you have chosen to provide that information. There are no methods or technologies to collect your information without your knowledge. And you always have the right to decline to share any information.
New reader? Check out my free email newsletters and subscribe.
jennybhattwriter.com will never provide your personal information to any third-party vendors without your prior consent.
Subscribers will not receive any unsolicited emails or correspondence if they have not provided jennybhattwriter.com prior permission. The email addresses will be used to provide updates via newsletters as agreed to by you. You are free to unsubscribe from any such newsletter at any time via the provided “unsubscribe” links.
All of the above pertains to the jennybhattwriter.com website. However, if/when you click a link to go to another website, you are subject to the privacy policies of that website and jennybhattwriter.com cannot be held responsible for any issues related to their handling of any information you may provide to them. Please make sure you familiarize yourself with the privacy policies of the websites you visit and/or to whom you provide your personal information.
All text, audio, and video content is, unless expressly stated, the copyright © of Jenny Bhatt. It is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License. Please ensure proper linkage and attribution and do not transform, adapt, or remix. Thank you.
Where expressly noted, book or article excerpts have been reproduced under the fair use law and copyright for such always resides with their authors.
If you have any questions, please contact me here.
Users are prohibited from violating or attempting to violate the security of the jennybhattwriter.com website. By way of example, you are prohibited from (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan, or test the vulnerability of a system or network or to breach security without proper authorization; (c) attempting to interfere with service to any user, host or network; (d) sending unsolicited mail, including promotions and/or advertising of products or services.
Looking for book recommendations? Check out my ongoing book lists.
If you have any questions about any of the above, please contact me via the form below. I will respond within one working week. Thank you. ~Jenny Bhatt