My Location All

Privacy Policy

The information we collect from users enables us to personalize and improve our services, and to allow our users to set up a user account and allows for repeat orders to be completed more quickly. This document describes the types of information we collect from our users and what we do with it among other privacy concerns.

It is important that you read our Privacy Policy, so that you fully understand the terms involved in your subscribing to our service, and how we use the personal information you submit. As we update and expand our services, this policy may change, so we recommend that you refer to it periodically. is powered by providing the online book hiring service along with e-Commerce facility making the availability of the hire of widest range of the books is strongly committed in protecting the privacy of our valued subscribers and customers. This privacy policy document contains information which you should go through so that you fully understand the terms involved in your subscribing to our varied services, and how we use the personal information shared by you to avail the various irresistible physical book services on hiring basis.

For additional information, please e-mail us at

... Read More ...

Children Protection Policies

This platform is open to the public but it is ONLY limited to 13 years and over. No underage child should access the platform on his/her own under any circumstance without parental guidance. Any customer who violates this policy will be deleted from the system and blocked from usage forever.

Personal information you provide to us

We receive and store any information you enter on our website or provide to us in any other way. The types of Personal Information collected may include your name, billing address, postal address, e-mail address and telephone numbers that are entered on this website, sent to us by email, or entered in the process of paying for an order.

Personal information collected automatically

We receive and store certain types of information whenever you interact with this website. We automatically receive and record information from your browser including your hardware model, operating system version, unique device identifiers, and mobile network information including phone number, browser type, IP address and the page you requested. This information is collected and stored using Google Analytics. Google Analytics is a web analysis service provided by Google. Google utilizes the data collected to track and examine the use of this website, to prepare reports on its activities and share them with other Google services.

Email communications

We may receive a confirmation when you open an email from this website, if your computer supports this type of program. We uses this confirmation to help us make emails more interesting and helpful.

Browser Cookies

Cookies are alphanumeric identifiers that we transfer to your computer's hard drive through your browser to enable our systems to recognize your browser and tell us how and when pages in our site are visited and by how many people. We do not combine the site usage information collected through cookies with other Personal Information. Most Web browsers automatically accept cookies, but you can usually change your browser to prevent that.

Ads appearing on this website may be delivered to users by our advertising partners, who may set cookies. These cookies allow the ad server to recognize your computer each time they send you an online advertisement to compile information about you or others who use your computer. This information allows ad networks to, among other things, deliver targeted advertisements that they believe will be of most interest to you. This Privacy Policy covers the use of cookies by this website and does not cover the use of cookies by any advertisers or by Google Analytics.

How we use information we collect

We use the information we collect to provide, maintain, protect and improve our service, to develop new ones. When you contact us, we may keep a record of your communication to help solve any issues you might be facing. We may use your email address to inform you about our services, such as letting you know about upcoming changes or improvements. We also use this information to offer you tailored content - like giving you more relevant search results and adverts.

We use information collected from cookies and other technologies to improve your user experience and the overall quality of our services.

We will ask for your consent before using information for a purpose other than those that are set out in this Privacy Policy.

We will use information as required by law.

Bestilaya processes personal information on our servers in many countries around the world. We may process your personal information on a server located outside the country where you live.

Security is a highly secured platform and has undergone penetration testing from a reputed agency. Our information security management framework provides robust controls for data encryption, data backups, server hardening, intrusion detection, patch management, protection against cross scripting, SQL injection attacks, etc.

Accepted Use

We will not use data for unlawful activities (such as child pornography, gambling, fraud, terrorist activities), sending unsolicited emails, for posting any material or transmitting any content that harasses, threatens the health and safety of our users or for posting any obscene, racist, indecent, malicious, harmful or violent content.


We store passwords in encrypted form.

Access Control

Only authorized persons can access data and all access are based on the principle of least privilege i.e. access is based on the user role and no access is given beyond what the role demands.

Information Security Organization

We have an information security and risk management committee headed by our CEO and with an independent board oversight.

Data Backup

Data is backed up on a daily basis. All backups are protected by either 256 bit AES encryption (Symmetric) or 2048 bit RSA (Asymmetric) encryption.

Confidentiality and Non-disclosure

We sign confidentiality and non-disclosure agreements with all our customers. Also, all our employees sign confidentiality and non-disclosure agreements in the interest of all.

Employee Background Verification and Screening

We do not perform background verification as a policy. We often verify references, KYC proofs and make sure that potential team members fit our organization values.

Data Encryption

We deploy robust encryption techniques in order to secure legally/contractually restricted data (i.e. sensitive data). The encryption plan covers emails, desktop/laptop file systems, external storage media, data backups, transport level encryption and others.

Patch Management

Our information technology assets (software, servers, desktops, and laptop computers owned and operated by are properly patched with the latest appropriate updates in order to reduce system vulnerability and to enhance and repair application functionality.

Server Hardening

We harden our operating system, application, database, web servers towards any unauthorized attacks.

Cross Scripting and SQL Injections

Our technology stack, platform and code base are designed and deployed to prevent cross-scripting and SQL injection attacks.

Data Testing

We do not use user data in our testing or development environment including § Uptime. We guarantee a 99.9% uptime of our systems except in the event of a natural disaster beyond our control.

Network and Application Level Redundancy

Network level redundancy is managed by our hosting provider, Software Technologies, an SSAE16 certified provider. Application level redundancy is managed in-house including § IP Restrictions. We only allow authorized IPs to connect to our systems to enhance the security system.

Ethics and Code of Conduct is a professionally run organization and follows ethical business practices.

Penetration Testing

All our key applications have undergone penetration testing from a reputed agency.

Data Retention

We retain data for a period specified in the contracts with our customers and comply with customer specific requirements. Our systems are capable of selective and automatic purging of sensitive data.

Customer Protection

When you place orders or access your account information, we offer the use of a secure server. The Secure Server Software (SSL) encrypts all information you input before it is sent to us. Furthermore, all of the customer data we collect is protected against unauthorized access.

Change to the policy

We may make changes to this policy as and when needed. You should check back for updates to this policy from time to time. The privacy policy can be viewed any time by visiting the Privacy Policy page on website. We strive towards offering the guaranteed contented services.