Intermediary Compliance Statement under Section 79 of the IT Act, 2000

These Intermediary Guidelines of compliance statement shall apply to all users of (the "Website"). By using this Website you agree and acknowledge to be bound by terms of this statement. References in these Terms to "we" or "us" are references to and “you” as users of

Purpose of the Website

Parijnan Foundation provides a web based platform which hosts information, photographs and description of products, articles and magazines, as also other features and / or other services offered from time to time etc, related to various activities and segments under Parijnan Foundation.

The issue of intermediary compliance is extremely crucial for which is committed to safeguarding the information provided by its members (registered users) and other visitors (unregistered users) as well safeguarding interest of all stakeholders.

Terms of statement

(1) As per rules of I.T. Act, 2000 we at (Intermediary) have published the user agreement (Terms of Use), rules and regulations, Privacy Policy and for access or usage of the through a computer resource by any person.

(2) As per such rules and regulations, terms and conditions or user agreement, we hereby inform you not to host, display, upload, modify, publish, transmit, update or share any information that,

  1. belongs to another person and to which the user does not have any right to;
  2. is grossly harmful, blasphemous, defamatory, obscene, pornographic, pedophilic, libelous, invasive of another’s privacy, hateful or racially, ethnically objectionable, disparaging, relating or encouraging money laundering or gambling or otherwise unlawful in any manner whatsoever;
  3. Harms minors in any way;
  4. Infringes any patent, trademark, copyright or other intellectual proprietary rights;
  5. Violates any law for the time being in force;
  6. Deceives or misleads the address about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;
  7. Impersonates another person;
  8. Contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource;
  9. Threatens the unity, integrity, defense, security or sovereignty of India, friendly relations with foreign states, or public order or causes incitement to the commission of any cognizable offence or is insulting any other nation.

(3) We at do hereby agree that we shall not knowingly host or publish any information or shall not initiate the transaction, select the receiver or transmission and select or modify the information contained in the transmission as specified in Clause (2) above.

(4) We at further agree that upon obtaining knowledge by itself or having been brought to actual knowledge by an affected person in writing or through email signed with electronic signature about any such information as mentioned in Clause (2) above, have established the system to act within thirty six hours and where applicable, work with user owner of such information to disable such information that is in contravention of the aforesaid Clause (2). Further, we also agree to preserve such information and associated records for at least ninety days for investigation purposes.

(5) By this statement, we at are informing you that in case of non – compliance of the rules and regulations, user agreement and privacy policy for access or usage, we may terminate the access or usage rights of the users on our website and remove the non – compliant information.

(6) We at agree and acknowledge that when required by lawful order, we will provide information or any such assistance to Government Agencies who are lawfully authorized for investigative, protective, cyber security activity. The information or any such assistance shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidences and punishment of offences under any law for the time being in force, on a request in writing stating clearly the purpose of seeking such information or any such assistance.

(7) We at agree and acknowledge that we have implemented all reasonable measures to secure our computer resource and information contained therein following the reasonable security practices and procedures as prescribed in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Information) Rules, 2011.

(8) We at agree to support cyber security incidents and also share cyber security incidents related information with the Indian Computer Emergency Response Team of India. (CERT-IN)

(9) We at agree that we shall not knowingly deploy or install or modify the technical configuration of computer resource or become party to any such act which may change or has the potential to change the normal course of operation of the computer resource than what it is supposed to perform thereby circumventing any law for the time being in force. Provided that we may develop, produce, distribute or employ technical means for the sole purpose of performing the acts of securing the computer resource and information contained therein.

(10) We declare that our Grievance Cell shall redress the complaints within one month from the date of receipt of complaint. Please use below information for any grievances.

Contact email:

Our Process of grievance handling:

Step1: Send email stating facts on our contact email.
Step2: We will send you reply for more details.
Step3: Provide more details and e-evidences to support your facts.
Step4: Grievance Resolution.