Passive Information Collection Policy
Upon navigating through this website, there is a possibility that certain anonymous information can be passively collected i.e. gathering information without you actively providing such information, using various technologies. The browser may automatically transmit to this website some anonymous information, but our website may also collect such and/similar information from your device through cookies and web tracking tags. It is possible that you may set your browser to notify in case a cookie is sent or to refuse cookies altogether, but there is also a possibility that certain features of this website might not work without cookies.
The purpose of such passively collected anonymous information is purely to provide better service to website visitors, necessarily to customize the website based on user preferences, compilation and analysis of data, statistics and trends, and otherwise administer and improve the website. The information collected does not provide personal information or identification and is also not combined with any personally identifiable information collected on forms elsewhere on the website with your consent.
Privacy Policy
The company after recognizing the importance of protecting personal information has established a privacy policy on the protection of personal information. The company constantly attempts to protect personal information appropriately by familiarizing its directors, officers and employees with the privacy policy.
The extracts of the privacy policy stated as below:
(a) Utilizing of Personal Information: The personal information is properly obtained and utilized for proper purposes to the extent necessary to provide services and/or to the extent necessary to achieve certain specified purposes.
(b) Provision of Personal Information to a Third Party: The information collected shall never be provided to any third party without obtaining the consent of the individual concerned. In special cases, information may be provided to such third party who has appropriate and adequate standards for the protection of such personal information and executes an appropriate contract. However, necessary and appropriate supervision shall be ensured towards implementing safety control measures with respect to such personal information.
(c) Managing Personal Information: The company prevents any leak or loss of, and damage to personal information, and implements necessary and appropriate measures to ensure that personal information is securely managed. In case of such as a leak of personal information occur, the company endeavors to minimize the damage by taking prompt action.
(d) Disclosure, Revision, and Deletion of Personal Information: When asked by a relevant individual to disclose his or her personal information, the company promptly discloses such personal information only after confirming such individual’s identification. When asked by a relevant individual to revise or delete his or her personal information, the company revises or deletes such personal information to the extent necessary only after confirming such individual’s identification.
(e) Compliance with the Existing Laws: The company endeavors to protect personal information by continuously improving the framework for the protection of personal information. The company complies with the laws and regulations pertaining to the protection of personal information.
(f) Any Revision of the Privacy Policy: The company may revise all or a part of its existing privacy policy and in case of any important revision, such revision will be notified on the company website.
Information Security Policy
The company provides comprehensive consulting services, by utilizing the company’s intellectual property based on confidential information disclosed by its clients. The company consistently implements business ethics in its professional approach and business conduct. It has been attempting to establish an information management framework, recognizing the need to expressly reiterate its understanding that information security is one of the most important issues concerning the management and the business operations. The company establishes a basic policy on information security and will appropriately protect all information assets that it deals with by ensuring that it’s directors, officers and employees abide by the information security policy set out as below.
(a) Establishing of Information Security Management System: The company ensures that all directors, officers and employees understand the importance of information security and establish adequate system to ensure appropriate management of information assets and continuously seek to improve it.
(b) Legal and Regulatory Compliance: The company ensures that its framework for information security is in compliance and conformity in letter and spirit with the relevant local laws, regulations and other various standards.
(c) Information Assets Protection: In order to protect information assets of the company and it’s clients from threats to confidentiality, integrity and availability of such information assets and to ensure the continuity of its business, shall formulated appropriate management plans for it’s information assets, clients as well a business partners.
(d) Education and Training: The company continuously trains and educates its directors, officers and employees to raise their awareness of information security and implement an information security system in all of its business activities.
(e) Incident Response: The company implements appropriate measures to prevent incidents relating to information security but also takes steps to prevent the recurrence of similar incidents.
Hyperlinking Policy
We do not object to you linking directly to the information that is hosted on our site and no prior permission is required for the same. However, we would like you to inform us about any links provided to our site. We do not permit our pages to be loaded into frames on your site. Our website’s pages must load into a newly opened browser window of the user.
Copyright Policy
Contents of this website may not be reproduced partially or fully, without due permission from e-Committee, Supreme Court of India. If referred to as a part of another website, the source must be appropriately acknowledged. The contents of this website can not be used in any misleading or objectionable context.