1. Introduction:

We at Vision-Scematics India Private Limited ("Vision-Scematics") are committed to safeguarding your privacy and ensuring that your personal data is protected. The protection of your personal data is of paramount importance to us, and we adhere to stringent data protection principles and regulations, including the General Data Protection Regulation (GDPR) and relevant local data protection laws. Using our website does not typically require the provision of personal data. However, should you choose to utilize our application services or interact with our offerings, the processing of personal data may become necessary. In such instances, where there is no statutory basis for processing, we will seek your explicit consent. This privacy policy aims to inform you about the types of personal data we collect, the purposes for which we use it, and the measures we take to protect it. Additionally, we outline your rights concerning your personal data and how you can exercise them. As the data controller, Vision-Scematics has implemented comprehensive technical and organizational measures to protect your personal data to the highest standard. Despite these efforts, we acknowledge that internet-based data transmissions can present security vulnerabilities. Consequently, we encourage you to share personal data with us through alternative methods such as telephone if you prefer. We value your trust and are dedicated to maintaining the highest standards of data protection and transparency.

2. Data Collection and Use

2.1 Information We Collect

Direct Interactions: When you use our website, applications, or services, you may provide data such as your name, email, phone number, and IP address.

Automated Technologies: We collect information about your device, browsing actions, and patterns using cookies and other tracking technologies.

Communication Records: We retain copies of your correspondence with us.

If you choose to create an account on our websites and mobile applications, providing your full name, email address, and IP address is mandatory. We will inform you at the point of collection if certain information is required.

2.1.1 Exclusions

This policy does not apply to: Information collected by any third parties, including through applications or content (such as advertising) that may link to or be accessible from our websites and mobile applications.

2.2 How We Use Your Information

2.3 Legal Grounds for Processing Your Information

You have control over how we use your data, and you can withdraw your consent at any time by contacting us. We only collect and process your data when we have a valid legal reason. These reasons include:

2.4 How We Store Your Information

2.4.1 Security

Safeguarding Your Data We implement comprehensive security measures to protect your personal data from accidental loss, unauthorized access, and misuse. Only individuals with a legitimate need to access your data are granted permission, and they are bound by confidentiality obligations. Security Breach Procedures In the event of a suspected data breach, we have protocols in place to manage the situation. We will notify you and the relevant regulatory authorities as required by law. Data Transmission Risks While we strive to protect your data, please note that internet transmissions are not entirely secure. Any data you send to our websites and mobile applications is at your own risk. Upon receipt of your information, we enforce stringent security procedures to prevent unauthorized access.

2.4.2 International Data Transfers

Global Data Processing: Your personal information may be transferred to and stored in locations outside your country. We process data in multiple countries and employ legal mechanisms to ensure these transfers comply with data protection regulations. Compliance and Protection: Countries where we process data may have different data protection laws compared to your own. To ensure your data remains protected, we frequently use Standard Contractual Clauses for transfers from designated countries. These clauses safeguard your data and provide remedies in case of misuse.

2.4.3 Updating Your Information

If your personal details change, please contact us to update or correct your information. We aim to make updates within 30 days to keep our records accurate and current.

2.5 Storage and Transfer of Data

Your personal data may be transferred to, stored, and processed in locations outside your country, including by our employees for tasks such as order fulfillment, payment processing, and support. By using our services and providing your personal data, you consent to these transfers and processing operations.

2.6 Data Retention

We retain your personal data as long as necessary for business or legal purposes. Data is kept while you are actively using our services, defined as logging in within 30 days of your last visit or hosting data on our servers. Some data can be deleted by you, some is automatically deleted, and some may be retained longer if required. Please note there may be delays in removing data from active and backup systems.

2.7 Managing Your Information

You have the right to manage your personal data with us. You can contact us to:

3. External Links

Our websites and mobile applications may contain links to third-party websites operated by our partners, advertisers, or affiliates. If you follow a link to any of these external sites, please note that they have their own privacy policies and terms of use. We do not accept any responsibility or liability for the content, policies, or practices of these third-party websites. Before providing any personal data to third-party websites, we recommend reviewing their privacy policies and terms of use to understand how your information will be managed.

4. Cookie Usage

Our websites and mobile applications use cookies, which are small files placed on your device with your consent. These cookies help us distinguish you from other users and improve your browsing experience by allowing us to:

5. Regulatory Compliance and Cooperation

We regularly review this Privacy Policy to ensure that our data processing practices are in line with its provisions. We strive to address and resolve any questions or concerns you may have about how we use your information. For formal written complaints, we will respond by reaching out to the complainant directly. Additionally, we collaborate with relevant regulatory authorities, including local data protection agencies, to address any issues related to data processing that we cannot resolve with you directly.

6. Updates to Our Privacy Policy

We may update or modify this Privacy Policy at any time. Any changes will be communicated through our websites and mobile applications. Continued use of our services following the publication of changes constitutes acceptance of the updated Privacy Policy. We will indicate the date of the most recent changes and provide access to previous versions of the policy for your review.

7. Our Commitment to Organizational Security

Information Security Program: We are dedicated to protecting customer data through a comprehensive Information Security Program. Third-Party Audits: We undergo independent third-party audits to test and validate our security controls. Penetration Testing: Annual third-party penetration tests help us identify and address security vulnerabilities. Roles and Responsibilities: Roles and responsibilities for data protection are clearly defined, and all team members must adhere to our security policies. Security Awareness Training: Our team receives regular training on industry best practices, including phishing and password management. Confidentiality: All employees sign a confidentiality agreement to ensure data protection. Background Checks: We conduct background checks on new hires in compliance with local laws to maintain security.

8. Securing Our Cloud Environment

Cloud Infrastructure We use Amazon Web Services (AWS) for hosting, both of which have robust security programs. For details, visit AWS Security. Data Hosting Our data is hosted on AWS databases located in the EU, with encryption applied both at rest and in transit. Vulnerability Management We conduct regular vulnerability scans, monitor threats, and use logging services to track cloud activity. Business Continuity Backup services and monitoring tools ensure data integrity and prompt alerts for any failures. Incident Response Our process includes escalation, rapid mitigation, and communication for handling security events.

9. Access Control and Vendor Management

Access to sensitive tools is restricted to authorized employees with Single Sign-On (SSO), 2-factor authentication (2FA), and strong password policies. We follow least privilege access and perform quarterly reviews. Password Management Team members use password managers for managing secure passwords, meeting strict complexity requirements. Vendor and Risk Management We conduct annual risk assessments and review vendors thoroughly before authorization.

10. Ownership and Use of Customer Data

Intellectual Property Rights: Each party retains ownership of their own intellectual property. Customers own the rights to their data, while Vision-Scematics owns the rights to the Services and Platform. Use of Customer Data: Vision-Scematics will only access or use Customer Data as needed to provide the agreed Services and support. Customer Feedback: Vision-Scematics may use any feedback provided by the Customer about the Services without obligation. Data uploaded by the Customer remains their property, and we will only access it to deliver the requested