Privacy Policy

How we collect, use, and protect your information

Last Updated: January 2024

This Privacy Policy outlines Infuro Tech Solutions LLP's policies for collecting, using, and sharing personal information about our customers. We are committed to protecting your privacy and ensuring the security of your personal data.

1. Types of User Data We Collect

Personal Identification Information

  • Contact Details: Full name, email address, phone number, and mailing address
  • Professional Information: Company name, job title, department, and business role
  • Account Information: Username, password (encrypted), and account preferences
  • Identity Verification: Government-issued ID numbers (when required for compliance)

Financial and Payment Information

  • Billing Details: Billing address, tax identification numbers, and payment history
  • Payment Methods: Credit card information, bank account details, and payment preferences
  • Transaction Records: Invoice details, payment confirmations, and financial correspondence
  • Service Costs: Project budgets, cost estimates, and financial agreements

Technical and Usage Data

  • Device Information: IP address, device type, operating system, and browser details
  • Website Analytics: Page views, session duration, click patterns, and user interactions
  • Performance Data: Loading times, error logs, and system performance metrics
  • Location Data: Geographic location (city/country level) for service optimization

Business and Project Information

  • Project Requirements: Technical specifications, business requirements, and project scope
  • Communication Records: Emails, chat logs, meeting notes, and correspondence history
  • Service Usage: Feature usage patterns, service preferences, and customization requests
  • Feedback and Reviews: Customer testimonials, satisfaction surveys, and improvement suggestions

Sensitive Information

  • Health Information: Only if relevant to workplace accommodations or emergency contacts
  • Legal Information: Contract terms, legal agreements, and compliance documentation
  • Security Credentials: Access tokens, API keys, and authentication data (encrypted)

2. How User Data is Protected and Stored

Data Security Measures

  • Encryption: AES-256 encryption for data at rest and TLS 1.3 for data in transit
  • Access Controls: Role-based access control (RBAC) with multi-factor authentication
  • Network Security: Firewalls, intrusion detection systems, and regular security audits
  • Physical Security: Secure data centers with 24/7 monitoring and biometric access
  • Employee Security: Background checks, security training, and confidentiality agreements

Data Storage and Retention

  • Primary Storage: Cloud-based storage with redundant backups across multiple locations
  • Backup Systems: Daily automated backups with 30-day retention and quarterly archival
  • Data Centers: Tier-3 data centers with 99.9% uptime guarantee and disaster recovery
  • Retention Periods: 7 years for financial records, 3 years for general data, 1 year for analytics
  • Secure Disposal: Certified data destruction when retention periods expire

Monitoring and Incident Response

  • Continuous Monitoring: 24/7 security monitoring and threat detection
  • Incident Response: Dedicated security team with 4-hour response time for critical incidents
  • Vulnerability Management: Regular security assessments and penetration testing
  • Compliance Audits: Annual third-party security audits and certifications
  • Breach Notification: 72-hour notification to authorities and affected users

3. Third-Party Data Sharing and Disclosure

We Do Not Sell Your Data

Infuro Tech Solutions LLP does not sell, trade, or rent your personal information to third parties for marketing or commercial purposes.

Authorized Service Providers

  • Payment Processors: Stripe, PayPal for secure payment processing (PCI DSS compliant)
  • Cloud Services: AWS, Google Cloud for hosting and data storage (SOC 2 Type II certified)
  • Communication Tools: Slack, Microsoft Teams for project collaboration
  • Analytics Services: Google Analytics, Mixpanel for website and service analytics
  • Email Services: SendGrid, Mailchimp for transactional and marketing emails
  • Customer Support: Zendesk, Intercom for customer service and support

Legal and Regulatory Disclosures

  • Law Enforcement: When required by law, court order, or government request
  • Regulatory Compliance: To comply with tax laws, financial regulations, and industry standards
  • Legal Proceedings: In connection with legal disputes, investigations, or enforcement actions
  • Safety and Security: To protect our rights, property, or safety of our users and employees

Business Transfers

  • Mergers and Acquisitions: In case of business sale, merger, or acquisition
  • Asset Transfers: When transferring assets or business operations
  • Successor Entities: To successor organizations with similar privacy commitments

Third-Party Data Protection

  • Data Processing Agreements: All service providers sign binding data protection agreements
  • Security Standards: Third parties must meet our security and privacy standards
  • Limited Access: Service providers only access data necessary for their services
  • Regular Audits: We audit third-party compliance annually

4. Use of Cookies and Tracking Technologies

What Are Cookies?

Cookies are small text files stored on your device that help us provide and improve our services. They enable website functionality, remember your preferences, and analyze how you use our services.

Types of Cookies We Use

  • Essential Cookies: Required for basic website functionality and security
  • Functional Cookies: Remember your preferences and settings
  • Analytics Cookies: Help us understand how visitors use our website
  • Marketing Cookies: Track advertising effectiveness and personalize content
  • Third-Party Cookies: Set by our service providers for specific functions

Specific Cookie Functions

  • Authentication: Remember login status and session management
  • Security: Detect and prevent fraud, abuse, and security threats
  • Performance: Optimize website speed and functionality
  • Personalization: Customize content and recommendations
  • Analytics: Track user behavior and service usage patterns
  • Advertising: Measure ad performance and target relevant content

Cookie Management and Control

  • Browser Settings: Control cookies through your browser's privacy settings
  • Cookie Consent: Manage cookie preferences through our consent banner
  • Opt-Out Options: Opt out of non-essential cookies while maintaining functionality
  • Cookie Deletion: Clear cookies manually or set automatic deletion
  • Do Not Track: Respect browser "Do Not Track" signals

Third-Party Cookie Providers

  • Google Analytics: Website usage analytics and performance tracking
  • Google Ads: Advertising effectiveness and conversion tracking
  • Facebook Pixel: Social media advertising and audience insights
  • LinkedIn Insight: Professional network advertising
  • Hotjar: User behavior analysis and heat mapping
  • Intercom: Customer support and communication

Cookie Retention Periods

  • Session Cookies: Deleted when browser is closed
  • Persistent Cookies: Retained for 30 days to 2 years based on function
  • Analytics Cookies: Retained for 26 months for trend analysis
  • Marketing Cookies: Retained for 90 days for campaign effectiveness
  • Security Cookies: Retained for 1 year for fraud prevention

5. Your Privacy Rights and Choices

Access Rights: Request a copy of your personal data and information about how we use it.

Correction Rights: Request correction of inaccurate or incomplete personal information.

Deletion Rights: Request deletion of your personal data (subject to legal requirements).

Portability Rights: Request your data in a structured, machine-readable format.

Restriction Rights: Request limitation of how we process your personal data.

Objection Rights: Object to processing of your data for specific purposes.

Marketing Preferences: Opt out of marketing communications and targeted advertising.

Cookie Preferences: Control cookie settings and tracking preferences.

6. International Data Transfers

Your information may be transferred to and processed in countries other than your own. We ensure appropriate safeguards are in place for such transfers, including:

  • Standard Contractual Clauses (SCCs) for EU data transfers
  • Adequacy decisions for countries with equivalent data protection standards
  • Certification schemes and codes of conduct
  • Regular assessments of third-country data protection laws

7. Children's Privacy

Our services are not intended for children under 13 years of age. We do not knowingly collect personal information from children under 13. If you believe we have collected information from a child under 13, please contact us immediately.

8. Changes to This Privacy Policy

We may update this Privacy Policy from time to time. We will notify you of any material changes by:

  • Posting the updated policy on our website with a new "Last Updated" date
  • Sending email notifications to registered users
  • Displaying prominent notices on our website
  • Providing advance notice for significant changes

Your continued use of our services after changes become effective constitutes acceptance of the updated policy.

9. Contact Information

Business Hours: Monday to Friday, 9:00 AM to 6:00 PM IST

Response Time: Within 48 hours for privacy-related inquiries

For questions about this Privacy Policy or our data practices, please contact our privacy team.