Privacy Policy

Last updated: October 24, 2024. Your privacy and the security of your data are our top priorities at Dheera Tech.

dataset

1. Information Collection

At Dheera Tech, we collect information to provide better services to all our users. The types of personal information we collect include:

  • Identifiers: Name, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, or other similar identifiers.
  • Professional Information: Job title, department, and company name when you register for our enterprise solutions.
  • Interaction Data: Information on your interaction with our website, applications, or advertisements.
analytics

2. How We Use Information

We use the information we collect from all our services for the following purposes:

Service Delivery

To maintain and improve our services, including troubleshooting, data analysis, and testing.

Personalization

To customize your experience with tailored content and recommendations based on your preferences.

Security

To protect Dheera Tech and our users from fraud, abuse, and security threats.

Communication

To contact you about service updates, marketing communications, and support requests.

cookie

3. Cookies and Tracking

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent.

"Cookies are files with small amount of data which may include an anonymous unique identifier. They help us understand how you interact with our site, allowing us to improve your overall experience."
verified_user

4. Data Protection

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

lock AES-256 Encryption for data at rest.
shield_person Role-based access controls for internal systems.
cloud_done Regular security audits and vulnerability assessments.
account_balance_wallet

5. Your Rights

Depending on your location, you may have the following rights regarding your personal data:

  • check
    Right of Access

    Request copies of your personal data.

  • check
    Right to Rectification

    Request correction of inaccurate information.

  • check
    Right to Erasure

    Request deletion of your data under certain conditions.

  • check
    Right to Portability

    Request transfer of data to another organization.