Privacy Policy

Information We Collect

We collect information you provide directly to us, such as when you contact us through our website, request services, or communicate with our team.

How We Use Your Information

  • To provide and improve our IT services
  • To communicate with you about projects and services
  • To send you technical updates and security alerts
  • To comply with legal obligations

Data Protection

We implement appropriate security measures to protect your personal information against unauthorized access, alteration, disclosure, or destruction. All data is encrypted and stored securely.

Terms of Service

Service Agreement

By engaging our services, you agree to these terms. Our IT solutions are provided "as is" with professional standards and industry best practices.

Client Responsibilities

  • Provide accurate project requirements and specifications
  • Timely feedback and approval during development phases
  • Payment according to agreed terms and schedules
  • Maintain confidentiality of provided access credentials

Intellectual Property

Upon full payment, clients receive ownership of custom-developed solutions. We retain rights to our proprietary tools, frameworks, and methodologies.

Data Security

Security Measures

We employ enterprise-grade security protocols including:

  • SSL/TLS encryption for all data transmission
  • Regular security audits and vulnerability assessments
  • Access controls and authentication systems
  • Secure development practices and code reviews

Data Retention

We retain client data only as long as necessary to provide services and comply with legal requirements. Data deletion requests are processed within 30 days.

Service Level Agreement

Response Times

  • Critical issues: 2-4 hours response time
  • High priority: 8-12 hours response time
  • Standard requests: 24-48 hours response time

Availability

We maintain 99.9% uptime for hosted solutions with 24/7 monitoring and support. Scheduled maintenance is performed during off-peak hours with advance notice.

Training Compliance

Trademark Compliance

As per compliance norms under the Trade Marks Act, 1999 (Section 29), the use of another institution's logo by a third party can amount to trademark use, and formal authorization is required. Therefore, we issue certificates under our company branding while clearly stating the training was conducted at your institution.

IT Company Rules & Compliance

Software Licensing

  • All software used in development must be properly licensed
  • Open source licenses must be respected and documented
  • Client projects will not include unlicensed software

Code Quality Standards

  • All code must pass security vulnerability scans
  • Code reviews are mandatory before deployment
  • Documentation must be provided for all custom solutions
  • Version control is required for all projects

Data Handling

  • Client data must be encrypted at rest and in transit
  • Access to production systems requires multi-factor authentication
  • Regular backups must be maintained and tested
  • Data breach incidents will be reported within 72 hours

Professional Standards

  • All team members must maintain professional certifications
  • Continuous learning and skill updates are mandatory
  • Client confidentiality agreements must be signed
  • Industry best practices must be followed

Regulatory Compliance

  • GDPR compliance for EU client data
  • IT Act 2000 compliance for Indian operations
  • ISO 27001 security standards implementation
  • Regular compliance audits and assessments

Contact Us

For questions about these policies or our services, please contact us:

Email: info@naxzant.com

Address: Pune, Maharashtra, India