The scope of the Policy is to the extent of the services provided by the Company, in relation to its Platform. The Secure Blink shall not be liable for any action/explanation for any use/misuse of data/Information beyond such scope of the Policy.
The Secure Blink Platform is not designed for Minors, however if a Minor(s) accesses the Platform for educational purposes, the same shall be done with the consent of the Legal Guardian of the Minor.
What Information do we access?
We may collect certain Personal Information of the User(s), including the name, e-mail address, registration details (in case of legal persons), contact information, domain identity, and other general information of the User.
Our Employees, associates, affiliates may also be required to provide such Personal Information while working/using the Platform for the purpose of tracking access of our Platform.
We may also collect, from the User(s) of our Product(s), and/or software(s), information relating to the internet protocol (“ IP”) address of your Device, browser type, the web page visited before you came to the Secure Blink’s website, information on your search for the Secure Blink website, identification numbers associated with your Devices (UID), GUID, MAC Address, your mobile carrier, local preferences, date and time stamps associated with your transactions, system configuration information, metadata concerning your files and other interactions with the Service. We will also collect usage-based activity data (e.g frequency of usage, activated functionality) to create an aggregated analysis of our customers’ usage pattern. However, all such information collected from our Product(s) and Software(s) Users are only used for evolving the service experience of the User in order to provide a wholesome and updated service. For the purpose of automated remediation rendering services to our registered users, we may use the platform based programmatic access of registered user's source code. However, such source code access shall be made by the Platform will not be human bases access, but Platform based programmatic access.
The Platform may access certain information for application security management i.e. passwords, two factor authentication softwares or key pairs and security device identification number.
Any Information obtained through any event conducted on Secure Blink or any associate Platform, or any information available under the public domain, requisite to develop an ease of access for communication. (Product Sign up Forms, Newsletters, and Contact Forms.)
We may obtain information from google analytics, segment, zoho hotjar for the purpose enhancing the User experience. We may also obtain certain information for sign up access to our Platform from google.
We may retain account information outputs for product usage timeline to be decided at the end of registered user – through military based encryption. However, the period of retainment of such information is based upon the timeline decided by the User
We are ISO 27001 certified, independently certified for protecting privacy of Personally Identifiable Information (PII) under GDPR readiness and processing other major data privacy certifications.
The ISO 27001, developed to “provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system”, uses a top down, risk-based approach and is technology-neutral. The specification defines a sixfold planning process and includes details for documentation, management responsibility, internal audits, continual improvement, and corrective and preventive action. The standard requires cooperation among all sections of an organisation.
The ISO 27001 standard does not mandate specific information security controls; however, it provides a checklist of controls that should be considered in the accompanying code of practice, ISO/IEC 27001:2013. This second standard describes a comprehensive set of information security control objectives and a set of generally accepted good practice security controls. The organizational Users are required to apply these controls appropriately in line with their specific risks. Third-party accredited certification is recommended for ISO 27001 conformance.
Any discrepancies and grievances with respect to processing of personal information shall be informed to the designated grievance officer at [email protected]
The applicable laws of India shall form the basis of governing law and disputes, in case, of Platform access and regulation.