Privacy Policy

General policy for the website.

Dreamsoft Computers LLC makes the same firm commitment to privacy for our Web site visitors as for our customers using our web-hosted services. We created this Online Privacy Policy (“Privacy Policy”) to give you confidence as you visit and use the Dreamsoft Computers LLC Web site, located at (the “Web site”) and to demonstrate our commitment to the protection of your privacy. This Privacy Policy is only applicable to the Web site, and not to any other Web sites that you may be able to access from the Web site, each of which may have data collection and use practices and policies that differ materially from this Privacy Policy. By using the Dreamsoft Computers LLC Web site, you are agreeing to the terms of the Privacy Policy.

* Notification of Privacy Policy Changes

We reserve the right to change the Privacy Policy at any time. If we decide to revise the Privacy Policy, we will post a notice at least thirty days prior to making any material changes. If we make material changes to this policy, we will notify you here, by email, or by means of a notice on our home page. Your continued use of the Web site, including use after the posting of any changes to these terms, will be deemed acceptance by you of the Privacy Policy.

* Notice Concerning Children

PLEASE NOTE: We are a general audience site, and do not direct any of our content specifically at children under 13 years of age. We understand and are committed to respecting the sensitive nature of children’s privacy online. If we learn or have reason to suspect that a Dreamsoft Computer LLC Web site visitor is under age 13, we will promptly delete any personal information regarding that visitor.

* Prohibited by the Telecommunications Regulatory Authority (TRA) of the UAE
  • Using the service to transmit any unsolicited commercial email or unsolicited bulk email. Activities which have the effect of facilitating unsolicited commercial email or unsolicited bulk email, whether or not that email is commercial in nature
  • Advertising, transmitting or otherwise making available any software, program, product or service that is designed to violate this AUSP or the AUSP of any other service provider, including but not limited to the facilitation of the means to send unsolicited bulk email, initiation of pinging, flooding, mail-bombing and denial of service attacks
  • All services and technologies that allow the transmitting, receiving, delivering and routing of voice telecommunications by means of Internet Protocol (also known as VoIP), unless specifically authorized by the service provider or the Telecommunications Regulatory Authority (TRA)
  • Running unconfirmed mailing lists. Subscribing email addresses to any mailing list without the express and verifiable permission of the email address owner is prohibited. All mailing lists run by the service provider’s customers must be of a closed-loop (i.e., 'confirmed opt-in') type. The subscription confirmation message received from each address owner must be kept on file for the duration of the existence of the mailing list. Mass emails (from any domain hosted by the service provider) to lists of email addresses purchased from third parties or referencing any of its accounts