AUDATEX SOLUTIONS PRIVATE LIMITED SAFEGUARDS YOUR PRIVACY
AUDATEX SOLUTIONS PRIVATE LIMITED (hereinafter referred to as "Audatex") recognizes the need to protect the privacy of the personal information you provide to Audatex with respect to your access and use of Audatex's Website.
Any reference to "you" or "your" shall mean to include Users (as defined herein below) subject to the context to which this term is used herein.
“User“ means a person who accesses or uses the Website and application.
"Website” means www.audatex.co.in or any other website(s) and/or domain(s), owned, affiliated, or managed by AUDATEX SOLUTIONS PRIVATE LIMITED
Any reference made to "we", "us" or "ours" refers to Audatex.
Users: persons/entities who access or use the Website
2. INFORMATION WE COLLECT
2.1. INFORMATION YOU GIVE TO US.
We ask for and collect the some personal information about you when you use our Website. This personal information is necessary for the adequate performance of the contract between you and us and to allow us to comply with our legal obligations. Without it, we may not be able to provide you with all the requested services
2.2. INFORMATION WE AUTOMATICALLY COLLECT
When you use our Website, we may collect information, including information about the kinds of services you use and how you use them. This information helps us enhance our services and functionalities of the Website, to serve you better.
2.2.1. Location Information:
When you use certain features of our Website, we may collect information about your precise or approximate location as determined through data such as your IP address or mobile device’s GPS to offer you an improved user experience. Most mobile/laptop devices allow you to control or disable the use of location services for applications in the device’s settings menu. We may also collect this information even when you are not using the Website if this connection is enabled through your settings or device permissions.
2.2.2. Website Usage Information
We collect information about how you interact with our services. This includes information such as access dates and times, Application/Website(s) features or pages viewed, Application/Website(s) crashes and other system activity, type of browser, and third-party sites or services you were using before interacting with our services. In some cases, we collect this information through cookies, pixel tags and similar technologies that create and maintain unique identifiers.
2.2.3. Transaction Information
We collect transaction details related to your use of our services, including the type of services you requested or provided, your purchase details, date and time the service was provided, amount charged, duration of usage, and payment method.
2.2.4. Device Information
We may collect information about the devices you use to access our services, including the hardware models, device IP address, operating systems and versions, software, file names and versions, preferred languages, unique device identifiers, advertising identifiers, serial numbers, device motion information, and mobile network information.
2.2.5. Communications and Interaction Information
When you communicate with Audatex or with other members using our Website, we collect information about such communication.
Some Audatex sites, like many other commercial web sites, may utilize a standard technology called “cookies” to collect information about how our site is used. Cookies were designed to help a web site operator determine that a particular user had visited the site previously and thus save and remember any preferences that may have been set while the user was browsing the site. Cookies are small strings of text that web sites can send to your browser. Cookies cannot retrieve any other data from your hard drive or obtain your e-mail address. If you are simply browsing an Audatex informational site, a cookie may be used to identify your browser as one that has visited the site before.
A cookie is a small data file that is transferred to your device. For example, a cookie could allow us to recognize your browser, while another could store your preferences. Cookies also allow ease of access, by logging you in without having to type your login name each time (only your password is needed); we may also use such cookies to display any advertisement(s) to you while you are on the Website or to send you offers aligning with your interests.
We also use other technologies with similar functionality to cookies, such as web beacons, pixels, mobile identifiers, and tracking URLs, to obtain Log Data. For example, our email messages may contain web beacons and tracking URLs to determine whether you have opened a certain message or accessed a certain link.
2.3. INFORMATION FROM THIRD PARTIES
We may receive information about you from third parties, in the course of your interaction with our Website. We may retain this information to provide our services to the Users and Workspace Partners, comply with legal obligations, or in order to improve our services and overall user experience.
3. HOW WE USE YOUR INFORMATION
4. HOW DO WE PROTECT YOUR INFORMATION?
We exercise great care to protect your personally identifiable information. All personal information you provide is transmitted using TLS (Transport Layer Security) encryption. TLS is a proven coding system that lets your browser automatically encrypt, or scramble, data before you send it to us. Website has stringent security measures in place to protect the loss, misuse, and alteration of the information under our control. Whenever you change or access your account information, we offer the use of a secure server. Once your information is in our possession we adhere to strict security guidelines, protecting it against unauthorized access. This includes, among other things, using industry standard techniques such as firewalls, encryption, intrusion detection and site monitoring. Unfortunately, no data transmission over the Internet can be guaranteed to be 100% secure. As a result, while we strive to protect your personally identifiable information, we cannot ensure or warrant the security of any information you transmit to us or receive from us. This is especially true for information you transmit to us via e-mail. We have no way of protecting that information until it reaches us. Once we receive your transmission, we make our best effort to ensure its security on our servers.
Internally, we will restrict access to your personally identifiable information to employees who need access to the information in order to do their jobs. These employees are limited in number, and are committed to our privacy policies.
We will review our security arrangements from time to time as we deem appropriate.
5. WHAT ARE YOUR CHOICES REGARDING COLLECTION, USE, AND DISTRIBUTION OF YOUR INFORMATION?
If you have voluntarily provided information, you consented to the collection and use of your personally identifiable information as described in this Privacy Statement. If, in connection with your use of a particular service, we ask to use your data in a way not described in this Privacy Statement and you do not wish to permit that use, you can choose not to use the particular service.
If you have voluntarily provided personally identifiable information, we may, from time to time, send you mail or e-mail regarding products and services. If you do not want to receive such offers and mailings, you can easily indicate that by checking the appropriate box on the submission form.
6. HOW CAN YOU HELP PROTECT YOUR INFORMATION?
f you are using an Audatex Web Site for which you registered and chose a password, we recommend that you do not divulge your password to anyone. We will never ask you for your password in an unsolicited phone call or in an unsolicited e-mail. Also remember to sign out of the registered site and close your browser window when you have finished your work. This is to ensure that others cannot access your personal information and correspondence if others have access to your computer.
7. HOW LONG DO WE KEEP YOUR PERSONAL INFORMATION?
Where your personal data is no longer required, we will ensure it is either securely deleted or stored in a way which means it will no longer be used by the business.
8. OTHER SITES
Audatex sites may contain links to other sites, including those of our business partners. While we seek to link only to sites that share our high standards and respect for privacy, we are not responsible for the privacy practices employed by other sites.
9. GRIEVANCE OFFICER
9.1. In accordance with the Information Technology Act, 2000 and rules made thereunder, the name and contact details of the Grievance Officer are as follows:
Name: VIKASH JAGNANI
Email ID: Vikash.firstname.lastname@example.org
13. GOVERNING LAW