Privacy Policy

Privacy Policy

At Reet, we are committed to protecting the privacy and security of our customers' personal information. In this Privacy Policy, "we," "us," or "our" refers to Reet, an online fashion apparel brand for women. This Privacy Policy describes how we collect, use, and protect your personal information when you use our website, apps, or related services (the "Services").

What Data We Collect

1.1 Data You Provide to Us

When you use our Services, we collect the data you provide directly, including:

Account Data: When you create an account, we collect and store the personal data you provide, such as your name, address, phone number, email address, password, gender, and date of birth.

Shared Content: When you interact with other users or share content publicly, such as when you post reviews on a product page, the shared content may be publicly viewable by others.

Data About Your Accounts on other Platforms: If you purchase Reet products using a third-party platform or service, we may collect certain information from that platform or service, such as your name, profile picture, account ID number, login email address, location, physical location of your access devices, gender, birthday, and list of friends or contacts.

Promotions and Surveys: If you participate in a survey or promotion, we will collect and store the data you provide, such as your name, email address, date of birth, or phone number.

Communications and Support: If you contact us for support or to report a problem or concern, we collect and store your contact information, the correspondence, and other data about you.

1.2 Data We Collect through Automated Means

When you access the Services, we collect certain data by automated means, including:

System Data: Technical data about your computer or device, such as your IP address, device type, operating system type and version, unique device identifiers, browser, browser language, domain and other systems data, and platform types.

Usage Data: Usage statistics about your interactions with the Services, such as products viewed, time spent on pages or the Service, pages visited, features used, your search queries, click data, date and time, and other data regarding your use of the Services.

Approximate Geographic Data: An approximate geographic location, including information such as country, city, and geographic coordinates, calculated based on your IP address.

How We Get Data About You

2.1 Cookies and Data Collection Tools

We and our service providers use cookies, tags, scripts, customized links, device or browser fingerprints, and web beacons (together, "Data Collection Tools") when you access and use the Services. These Data Collection Tools automatically track and collect certain System Data and Usage Data (as detailed in Section 1) when you use the Services. In some cases, we tie data gathered through those Data Collection Tools to other data that we collect as described in this Privacy Policy.

We use cookies for purposes such as analyzing your use of the Services, personalizing your experience, making it easier to log into the Services, and recognizing you when you return. Please see our separate Cookie Policy for more information about the specific cookies we use.

We use web beacons for purposes such as identifying whether a page was visited, identifying whether an email was opened, and advertising more efficiently.

How We Use Your Data

We use the data we collect to provide and improve our Services, to personalize your experience, to communicate with you, to advertise and market our products and services, and to comply with legal obligations.

How We Share Your Data

We may share your data with our service providers who help us to provide the Services, with other companies within our corporate group

 2.2 Analytics

 We use third-party browser and mobile analytics providers like Google Analytics, Facebook and Shopify. These providers use Data Collection Tools to help us analyze your use of the Services, including information like the third-party website you arrive from, how often you visit our site, usage and performance data, and your purchasing behavior. We use this data to improve the Services, better understand how the Services perform, and provide information that may be of interest to you.

 2.3 Online Advertising

 We use third-party advertising services like Facebook, Google, and other ad networks and ad servers to deliver advertising about our Services on other websites and applications you use.

The ads may be based on things we know about you, like your Usage Data and System Data (as detailed in Section 1), and things that these ad service providers know about you based on their tracking data. The ads can be based on your recent activity or activity over time and across other sites and services, and may be tailored to your interests.

Certain advertising services we use may also place cookies or other tracking technologies on your computer, phone, or other device to collect data about your use of our Services, and may access those tracking technologies in order to serve these tailored advertisements to you.

With your consent, we may send you marketing communications, for example by email to provide you with information on products, services that we, or third parties offer, competitions and other marketing information that we consider may be relevant to you or that you might be interested in, even after you cease acquiring products or services from us. You have the option to withdraw your consent to these communications at any time by following the unsubscribe link included in any marketing emails we send.


  1. What We Use Your Data For

 We use your data to do things like troubleshoot issues, secure against fraud and abuse, serve personalized advertising, and as required by law or necessary for safety and integrity.

We also use the data we collect through your use of the Services to:

  • Provide and administer the Services, including to display customized content and facilitate communication with you;
  • Process your requests and orders for products, information, or features;
  • Communicate with you about your account by:
  • Responding to your questions and concerns and verifying your identity in order to do so;
  • Sending you administrative messages and information, including messages regarding your orders, notifications about changes to our Service, and updates to our agreements;
  • Sending you information and messages about our rewards programs, new services, new features, new products, promotions, recipes, and newsletters (which you can opt out of at any time);
  • Manage your account preferences;
  • Facilitate the Services’ technical functioning, including troubleshooting and resolving issues, securing the Services, and preventing fraud and abuse;
  • Solicit feedback from users;
  • Market and administer surveys and promotions operated or sponsored by Farm Rio;
  • Learn more about you by linking your data with additional data through third-party data providers or analyzing the data with the help of analytics service providers;
  • Identify unique users across devices and browsers;
  • Tailor advertisements across devices and browsers;
  • Improve our Services and develop new products, services, and features;
  • Track purchases and usage data to analyze trends and traffic;
  • Advertise the Services on third-party websites and applications;
  • Conduct activities required or permitted by law; or
  • To take other actions that, in our sole discretion, we determine to be necessary to ensure the safety or integrity of our users, employees, third parties, the public, or our Services.

In respect of each of the purposes for which we use your personal data, data protection laws also require us to ensure that we have a ‘legal basis’ for that use. Most commonly, we will rely on one of the following legal bases:

  • We have a legitimate interest. This is the most flexible legal basis for Processing and may only be relied upon if our legitimate interests are not overridden by your interests or fundamental rights and freedoms. When relying on this purpose, we will conduct a balancing test or legitimate interest assessment to determine if your rights and freedoms override our interests in Processing Personal Data.
  • We have a contractual obligation. We rely on this legal basis where we have entered into a contract with you (such as a purchase order) and it is necessary for us to process your personal data to comply with our obligations under such contract. For instance, we will require your delivery address to send you the items you have purchased as part of your purchase order.
  • We have your consent. We rely on this legal basis to process your personal data when you have consented to such processing. Your consent must be freely given, informed, undisputable/unambiguous and capable of being withdrawn at any time.
  • Performance of legal or regulatory obligation. We can rely on this legal basis to process your personal data when it is necessary for us to comply with a legal obligation to which we are subject. For instance, we may be asked by a government authority, court, or law enforcement agency to share your personal information. 
  1. Who We Offer Your Information With
  • We might impart your information to outsiders under the accompanying conditions or as in any case portrayed in this Protection Strategy:
  • With Specialist co-ops, Project workers, and Specialists. We share your information with outsider organizations who perform administrations for our benefit, similar to installment handling, item conveyance, information investigation, showcasing and publicizing administrations (counting retargeted promoting), email and facilitating administrations, and client administrations and backing. These specialist co-ops might get to your own information and are expected to utilize it exclusively as we direct to offer our mentioned support.
  • With Examination and Information Improvement Administrations. As a feature of our utilization of outsider examination apparatuses like Google Investigation and information improvement administrations, we share specific contact data, Record Information, Framework Information, Use Information (as itemized in Segment 1), or de-recognized information on a case by case basis. De-recognized information implies information where we've eliminated things like your name and email address and supplanted it with a symbolic ID. This permits these suppliers to give investigation administrations or coordinate your information with freely accessible data set data (counting contact and social data from different sources).
  • To Direct Advancements and Reviews. We might share your information as important to control, market, or support advancements and reviews you decide to take part in, as expected by material regulation (like to give a victor’s rundown or make required filings), or as per the standards of the advancement or overview.

For Security and Legitimate Consistence. We might reveal your information to outsiders on the off chance that we (in our only prudence) have a pure intentions conviction that the exposure is:

  • Permitted or legally necessary;
  • Requested as a component of a legal, legislative, or legitimate request, request, or continuing;
  • Reasonably essential as a feature of a legitimate summon, warrant, or other lawfully substantial solicitation;
  • Reasonably important to implement our Agreements, Security Strategy, and other lawful arrangements;
  • Required to recognize, forestall, or address extortion, misuse, abuse, expected infringement of regulation (or rule or guideline), or security or specialized issues; or
  • Reasonably essential in our caution to safeguard against up and coming mischief to the privileges, property, or wellbeing of Reet, our clients, workers, individuals from the general population, or our Administrations.
  • We may likewise uncover information about you to our evaluators and lawful guides to survey our divulgence commitments and privileges under this Protection Strategy.
  • During an Adjustment of Control. On the off chance that Reet goes through a deal like a consolidation, obtaining, corporate divestiture, or disintegration (counting liquidation), or an offer of all or a portion of its resources, we might share, reveal, or move each of your information to the replacement association during such change or in consideration of a progress (counting during an expected level of effort).
  • With Your Consent. With your assent, we might share your information to outsiders outside the extent of this Protection Strategy.
  1. Security

Reet goes to suitable security lengths to safeguard against unapproved access, change, divulgence, or obliteration of your own information that we gather and store. These actions change in view of the sort and responsiveness of the information. Tragically, no framework is 100 percent secure, so we can't ensure that correspondences among you and Reet, the Administrations, or any data furnished to us regarding the information we gather through the Administrations will be liberated from unapproved access by outsiders. Your secret phrase is a significant piece of our security framework so you should safeguard your secret key and reach us in the event that you suspect any unapproved admittance to your record.

  1. Your Privileges

You have specific privileges connecting with our utilization of your information, including the capacity to quit limited time messages, treats, and assortment of your information by certain investigation suppliers. You can refresh or end your record from inside our Administrations, and can likewise reach us to practice your freedoms regarding your own information. A parent who accepts we have unexpectedly gathered individual information about their underage youngster ought to contact with any worries.

6.1 Your Decisions About the Utilization of Your Information

You can decide not to give us certain information yet you will most likely be unable to utilize specific highlights of the Administrations.

  • To prevent getting limited time correspondences from us, you can quit by involving the withdraw component in the special correspondence you get or by changing the email inclinations in your record. No matter what your email inclination settings, we will send you value-based and relationship messages with respect to the Administrations, including managerial affirmations, request affirmations, significant updates about the Administrations and notification about our arrangements.
  • The program or gadget you use might permit you to control treats and different kinds of nearby information stockpiling. Your remote gadget may likewise permit you to control whether area or different information is gathered and shared. For additional data, if it's not too much trouble, see our different Treat Strategy.
  • To quit Google's presentation publicizing or to alter Google Show Organization advertisements, visit the Google Promotions Settings page.
  • To quit permitting Google Examination to utilize your information for investigation or improvement, see the Google Examination Quit Program Extra.
  • To refresh information you give straightforwardly, you can sign into your record and update such data.
  • You may likewise end your record with us. Assuming you have any issues ending your record, email us at Indeed, even after your record is ended, some or your information might in any case be all noticeable to other people, including without impediment any information that has been remembered for an item survey. Indeed, even after your record is ended, we hold your information however long we have a genuine reason to do as such (and as per material regulation), incorporating to help with legitimate commitments, resolve debates, and implement our arrangements. We might hold and unveil such information as per this Protection Strategy after your record has been ended.

Assuming that you have any inquiries regarding your information, our utilization of it, or your freedoms, reach us at 

6.2 Your freedoms connecting with your own information

Under the information assurance regulations, we follow, you might reserve the privilege to:

  • Demand admittance to your own information. This empowers you to get a duplicate of the individual information we hold about you and to make sure that we are legally handling it.
  • Demand remedy of the Individual Information that we hold about you. This empowers you to have any inadequate or erroneous data we hold about you remedied.
  • Demand deletion of your own information. This empowers you to request that we erase or eliminate individual information where there is no great explanation for us to keep on handling it. You likewise reserve the privilege to request that we erase or eliminate your own information where you have practiced your entitlement to protest handling.
  • Object to handling of your own information. This right exists where we are depending on a Real Interest as the legitimate reason for our handling and there is something about your specific circumstance, which makes you need to protest handling on this ground. You likewise reserve the option to protest where we are handling your own information for direct promoting purposes.
  • Demand the limitation of handling of your own information. This empowers us to suspend the handling of individual information about you, for instance assuming you maintain that we should lay out its exactness or the justification behind handling it.
  • Demand the exchange of your own information. We will give to you, or an outsider you have picked, your own information in an organized, usually utilized, machine-decipherable configuration. Note that this right just applies to mechanized data which you at first gave agree to us to utilize or where we utilized the data to play out an agreement with you.
  • Pull out assent. This right just exists where we are depending on agree to handle your own information. Assuming that you pull out your assent, we will most likely be unable to give you admittance to specific functionalities of our Administrations.

6.3 How to practice your freedoms

  • To practice any of the freedoms depicted above, kindly email us at Kindly permit as long as 30 days for a reaction. For your security, we might expect that the solicitation be sent through the email address related with your record, and we might have to confirm your character prior to carrying out your solicitation. Kindly note that we hold specific information where we have a legal premise to do as such, including for obligatory record-keeping and to finish exchanges.

6.4 Our Strategy Concerning Youngsters

The Administrations are not expected for the utilization of youngsters younger than 16 and we don't intentionally gather information connecting with such kids. Assuming we discover that we've gathered individual information from a kid under 16 years old, we will find sensible ways to erase it.

Guardians who accept that Reet might have gathered individual information from a kid under those ages can present a solicitation that it be taken out to

  1. Refreshes and Contact Data

7.1 Adjustments to this Protection Strategy

Occasionally, we might refresh this Security Strategy. In the event that we roll out any material improvements to it, we will tell you by means of email, through a notice posted on the Administrations, or as expected by relevant regulation. Except if expressed if not, changes will become successful on the day they are posted.

As allowed by material regulation, in the event that you keep on utilizing the Administrations after the successful date of any change, then, at that point, your entrance and additionally use will be considered an affirmation and acknowledgment of (and consent to follow and be limited by) the modified Security Strategy. The updated Protection Strategy overrides generally past Security Arrangements.

7.2 Translation

Any promoted terms not characterized in this approach are characterized as determined in Reet's help out. Any rendition of this Protection Strategy in a language other than English is accommodated comfort. In the event that there is any contention with a non-English rendition, the English language variant will win.

7.3 Inquiries/Objections

Assuming you have any inquiries, concerns, or grievances in regards to our Security Strategy, kindly go ahead and contact our protection group (counting our assigned individual data assurance supervisor) through email at

You can likewise hold up a grievance with your public Information Security Authority in the event that you are discontent with how we have utilized your information.