We collect the content and other information you provide when you use our services through web application, including when you sign up for an account using your domain / active directory credentials or during update your profile information i.e. domain name, name, employment related information such as company name, unit, contact details and additional information such as language preference and system details. It is important to note that most of this information is optional to provide as per the registration of the application; while mandatory fields are limited but generally highlighted by asterisk (*) sign on the user profile page.
We also collect information about how you use our services, such as the types of content you view or engage with, along with time stamp of your activities.
When you access through mobile application, we collect the content, contact details and other information such as device details.
We collect information from or about the computers, or other devices where you install or access our application or services, depending on the permissions you’ve been granted. We may associate the information we collect from your different devices, which helps us provide consistent services across your devices. We collect attributes such as the current location, operating system, browser details, login details, device time, settings such as screen resolution, identifiers such as IP address and device details such as device name, device version, udid, device model and device type.
The sign up information is necessary to authenticate you and to recognize you as an authorized user to our application and services.
The information we collect is used to improve the content of our webpage to customize experience to our users or other integrated applications or services used by you, and analyze the information to improve services, develop new features, and conduct compliance activities.
We use your contact information to communicate with you about our services, its usage and let you know about our terms and policies. We also use your information for various official purposes including support and troubleshooting activities.
We use the information we have to help verify accounts and activity, and to promote security of our services, such as by investigating suspicious activity or violations of our terms or policies. We work hard to protect your account using teams of engineers, procedural controls, automated systems and advanced technologies. We have appropriate technical, administrative and physical safeguards in place to help protect against unauthorized access, use or disclosure of the information we collect, process or store. Still it is important to note that no data transmission over the Internet or information storage technology can be guaranteed to be 100% secure but we always continue to evaluate and implement enhancements in security technology and practices.
We may access, preserve and share your information in response to a legal request (like a search warrant or court order). This may include responding to legal requests from jurisdictions outside of India where we have a good faith belief that the response is required by law in that jurisdiction, affects users in that jurisdiction, and is consistent with internationally recognized standards. We may also access, preserve and share information when we have a good faith belief it is necessary to: detect, prevent and address fraud and other illegal activity; to protect ourselves, you and others, including as part of investigations; or to prevent death or imminent bodily harm.
If the ownership or control of all or part of us or a specific services changes as a result of a merger, acquisition or sale of assets, we may transfer your information to the new owner.
There may be other integrated applications or services used by you, which may consume the collected information for seamless experience of our users.
You also need to participate for your own data security and support effective implementation of information security processes or practices. You may also learn through IT Accepted Use Policy for Do’s and Don’ts and ways to remain vigilant from information or cyber security threats. You are also encouraged to report any suspicious event, incident or weakness in controls at email@example.com
Where retention of personal data is required by law, we complies with the required retention periods. In other circumstances, we retains personal data for as long as necessary for the business purposes specified in our respective company processes, already available to you through intranet or other similar means.