Home/Privacy Policy

Privacy Policy

How we handle your data while providing software, consultancy, and training services

Last Updated: March 12, 2025

Our privacy policy outlines how we collect, use, and safeguard your information when you engage with our software solutions, IT consultancy services, or participate in our training programs. We prioritize data security while delivering high-quality technology services.

Information We Collect

When you use our software, engage our consultancy services, or participate in our training programs, we may collect business contact information, technical environment details, project requirements, training registration data, and user credentials for the systems we develop or maintain. For software products, we may collect usage telemetry to improve functionality and user experience.

Client Project Data

During consultancy engagements, we may have access to your business systems, databases, and client information. We treat all client data as confidential and only access information necessary to perform the contracted services. Any data accessed during system development, integration, or troubleshooting is used solely for the purpose of delivering our services.

Training Participant Information

For training services, we collect participant names, contact details, skill levels, and training progress. This information helps us deliver personalized training experiences and provide certificates of completion. We may also collect feedback to improve our training programs.

Software Usage Data

Our software products may collect usage statistics, performance metrics, error reports, and feature utilization data. This technical information helps us identify software issues, optimize performance, and develop product improvements. All such data is collected in anonymized or aggregated form whenever possible.

Data Security Practices

We implement industry-standard security measures to protect your data, including encryption, access controls, secure development practices, and regular security assessments. Our team follows strict data handling protocols, especially when working with sensitive business information or personal data during consultancy engagements.

Third-Party Services

We may utilize third-party services for project management, communication, hosting, and support. These vendors are carefully selected based on their security practices and compliance with relevant data protection regulations. They are only permitted to process your data as necessary to provide their services to us.

Data Retention and Disposal

We retain client data only for the duration necessary to provide our services and to comply with legal obligations. Upon contract completion, we securely dispose of client data according to our retention policies or return it as specified in our service agreements.

Your Rights

Depending on applicable laws, you may have the right to access, correct, or delete your personal information. For software users, you may have options to configure data collection settings or opt out of certain types of data collection. For consultancy clients, data handling terms are typically outlined in our service agreements.

Changes to This Policy

We may update our Privacy Policy to reflect changes in our practices or regulatory requirements. We will notify existing clients of significant changes through our standard communication channels and post updates on our website.

Contact Us

If you have questions about how we handle data for our software products, consultancy services, or training programs, please contact our data protection team through the methods listed on our contact page.

Industry Compliance & Certifications

GDPR Compliant
ISO 27001
HIPAA Compliant
SOC 2 Type II

Service-Specific Privacy Information

Software Development

We follow secure development practices and data protection by design principles. All code repositories and development environments are secured with appropriate access controls.

IT Consultancy

Our consultants sign confidentiality agreements and are trained in data protection. Client systems are accessed only as authorized and all consulting activities are documented.

Training Services

Training materials avoid using real client data. Participant information is kept confidential and training environments are secured with temporary credentials.