1. Introduction
Welcome to JDB Infotech Pvt Ltd. We are committed to protecting your privacy and ensuring that your personal information is handled in a safe and responsible manner. This Privacy Policy outlines how we collect, use, disclose, and safeguard your information when you visit our website or use our services.
2. Data Collected
1.1 Personal Information: We may collect personal information that you voluntarily provide to us when you register on the website, place an order, subscribe to our newsletter, respond to a survey, fill out a form, or use our services. This may include your name, email address, phone number, and payment information.
1.2 Usage Data: We may automatically collect information about how you interact with our website and services, such as your IP address, browser type, operating system, pages visited, and the dates and times of your visits.
1.3 Cookies: We use cookies and similar tracking technologies to track the activity on our website and store certain information. Cookies are small data files that are placed on your device. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our website.
3. How We Use Your Information
2.1 To Provide and Maintain Our Services: We use your information to deliver the services you have requested, process transactions, and manage your account.
2.2 To Improve Our Services: We analyze usage data to understand how our website and services are being used, allowing us to enhance and optimize our offerings.
2.3 To Communicate with You: We may use your personal information to contact you with newsletters, marketing or promotional materials, and other information that may be of interest to you. You can opt-out of receiving these communications at any time.
2.4 To Enforce Our Policies: We use your information to enforce our terms, conditions, and policies, and to comply with legal and regulatory requirements.
4. Sharing Your Information
3.1 Third-Party Service Providers: We may share your information with third-party service providers who perform services on our behalf, such as payment processing, data analysis, email delivery, hosting services, customer service, and marketing assistance.
3.2 Business Transfers: In the event of a merger, acquisition, or sale of all or a portion of our assets, your personal information may be transferred to the acquiring company.
3.3 Legal Requirements: We may disclose your personal information if required to do so by law or in response to valid requests by public authorities (e.g., a court or government agency).
5. Security of Your Information
We use administrative, technical, and physical security measures to protect your personal information. While we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
6. Your Data Protection Rights
Depending on your location, you may have the following rights regarding your personal information:
- The right to access – You have the right to request copies of your personal information.
- The right to rectification – You have the right to request that we correct any information you believe is inaccurate or complete information you believe is incomplete.
- The right to erasure – You have the right to request that we erase your personal information, under certain conditions.
- The right to restrict processing – You have the right to request that we restrict the processing of your personal information, under certain conditions.
- The right to object to processing – You have the right to object to our processing of your personal information, under certain conditions.
- The right to data portability – You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions.
7. Security Measures
We use the SSL/HTTPS protocol throughout our site. This encrypts our user communications with the servers so that personally identifiable information is not captured/hijacked by third parties without authorization.
In case of a data breach, system administrators will immediately take all needed steps to ensure system integrity, will contact affected users and will attempt to reset passwords if needed.