June 2, 2021
Information you give us: During the process of Contact us/get in touch, you will be requested to complete a registration form asking for basic online contact information about yourself or provide us with your details over the phone, for example when you request for a quote on specific development service, register to attend one of our events (whether as a delegate, exhibitor or attendee) or subscribe to our mailing list. This information might include your name, address, email address, phone number and other relevant information. You agree and acknowledge that when we receive e-mails from you, we may retain the content of any e-mail messages sent to us, as well as details of your e-mail address. You further agree and acknowledge that we shall use your email ID and mobile number information for sending promotional/informational messages.
Information we collect about you: We will collect any information contained in any correspondence between you and us via contact forms on websites, and emails or telephone calls.
We may collect, for the purposes of service & solutions promotions and any events that we exhibit or participate, information about your location in and engagement with the event.
We use third party analytics services for more detailed analytics purposes. It is important for us to inform you that we will have limited control over these Analytics and therefore you clearly agree and acknowledge that we shall not be held responsible for privacy issues relating to the same.
Information we receive from third parties: We may collect information about you from third parties that we work closely with for the purposes of delivering to you the services rendered by us. Third party entities may collect information directly from your websites or your digital presence. We may also receive information about you from third parties where you have consented to such third party sharing your information.
How we use information about you
You can find out more information on the privacy notice provided at the time you submit your data to us or in your contract with us (if applicable).
Third Party Content, Sites, and Contributions
How we look after your data and how long we keep it for
We use a variety of technological and operational security measures to protect your information against any unauthorized access to, unlawful use of and modification and destruction of any personal data we store.
Transmission of information over the internet can be insecure, and although we employ measures to protect your information from unauthorized access, we cannot always guarantee the security of information sent over the internet.
Where we store your information
Where you are interacting with a Fluttertop, our local High-end IBM cluster servers & IBM Storage servers are secured with Sonic wall firewall and online servers are on secured cloud platforms and on top of that Fluttertop has configured some extra layer of data protection and security requirement.
Fluttertop has a systematic and ongoing approach for managing information security that affect the confidentiality, integrity, and availability of company and customer information.
Once you are registered at the our site, you will have the option at any stage to inform us that you no longer wish to receive future services, e-mails and you may “unsubscribe” by sending unsubscribe request. Further, as per Rule 5(7) of the India’s Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 of Information Technology Act, 2000 amended through Information Technology Amendment Act, 2008, you have an option to withdraw your consent for use of your sensitive personal data given earlier to us. Such withdrawal of consent shall be sent in writing to our registered address.
Reasonable Security Practices As per I.T.Act, 2000 and its Rules We have implemented reasonable security practices as per Rule 8 of the India’s Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 of Information Technology Act, 2000 amended through Information Technology Amendment Act, 2008.
We have implemented stringent, internationally acceptable standards of technology, managerial security, technical security, operational security and physical security in order to protect your personally identifiable information from loss, misuse, disclosure, alteration or destruction. The data resides behind a firewall, with access restricted to our authorized personnel’s only.
We have implemented “Reasonable Security Practices” as required by the India’s Information Technology Act, 2000 rules including any amendment in the said Act and its rules. By complying with such provisions, We assure you proper care and control over our I.T. and Security operations as required under relevant sections mainly section 43, 43A, 45, 66,72A & 85 of I.T.Act, 2000 and I.T.A.A, 2008 including related rules and therefore you agree that we shall not be held responsible for any fraudulent/criminal activity with regards to your sensitive personal information stored in our website.
By using this website you agree that we shall not be held responsible for any uncontrollable security attacks and in such cases you agree that we shall not be held responsible for any type of financial losses, loss of opportunity, legal cost, attorney’s fees, business losses, reputation loss, direct and indirect losses that may occur to you as per the Provisions of Section 43, 43A and 45 of Information Technology Act, 2000 including any amendments in the said Act and any other laws of India for the time being in force.
You further agree that our management shall not be held responsible directly or indirectly for any cyber-crime related criminal liabilities under I.T.Act,2000 relating to your information as you have agreed and acknowledged that our management complies with due diligence (care & controls) requirements of I.T.Act,2000 including its rules and amendments.