Desi Books participates in affiliate marketing programs that pay a small commission when the products are purchased through links on the website. This commission goes toward the costs of running Desi Books.
Desi Books does not collect any personal information unless you have chosen to provide that information. There are no methods or technologies for us to collect your information without your knowledge. And you always have the right to decline sharing any information.
Desi Books will never provide your personal information to any third-party vendors without your prior consent.
Subscribers will not receive any unsolicited emails or correspondence if they have not provided Desi Books with prior permission. Email will be used to provide updates via newsletters as agreed to by you. You are free to unsubscribe from any such newsletter at any time via the provided “unsubscribe” links.
All of the above pertains to the Desi Books website. However, if/when you click a link to go to another website, you are subject to the privacy policies of that website and Desi Books cannot be held responsible for any issues related to their handling of any information you may provide to them. Please make sure you familiarize yourself with the privacy policies of the websites you visit and/or to whom you provide your personal information.
All text, audio, and video content is, unless expressly stated, the copyright © of Desi Books LLC. It is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License. Please ensure proper linkage and attribution and do not transform, adapt, or remix. Thank you.
Where expressly noted, book excerpts have been reproduced with permission from the book’s author and copyright for such always resides with that author.
If you have any questions, please contact here.
Users are prohibited from violating or attempting to violate the security of the Desi Books website. By way of example, you are prohibited from (a) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (b) attempting to probe, scan, or test the vulnerability of a system or network or to breach security without proper authorization; (c) attempting to interfere with service to any user, host or network; (d) sending unsolicited mail, including promotions and/or advertising of products or services.