Privacy Policy
User Data Information Collection
At Gyant®, we are dedicated to safeguarding your privacy. This Privacy Policy explains how we collect, use, disclose, and protect your information when you visit our website or utilize our software and native app services.
I. Personal Information
We may collect personal information from you, which includes, but is not limited to:
- Name: Your full name.
- Location: Your geographical location.
- Camera Access: Permission to access your device’s camera.
- Email Address: Your email for communication purposes.
- Phone Number: Your contact number.
- Organization: The name of the organization you are affiliated with.
This information is collected to enhance your experience and provide you with the services you request.
II. Non-Personal Information
We automatically collect non-personal information when you access and use our services. This information may include, but is not limited to:
- IP Address: The unique address assigned to your device when you connect to the internet.
- Browser Type: The type of web browser you are using to access our services.
- Operating System: The operating system installed on your device.
- Visited Pages: The specific pages you visit while using our services.
- Timestamps: The date and time of your interactions with our services.
This data is collected to enhance our services and improve user experience.
III. Use of Information
We may utilize your information for the following purposes:
- Provision and Maintenance of Services
To provide and sustain the services we offer. - Website and Software Improvement
To enhance and optimize our website and software applications. - Communication
To communicate with you, which includes responding to your inquiries. - Marketing and Updates
To send you updates, newsletters, and promotional materials. - Legal Compliance
To fulfill our legal obligations as required by applicable law.
IV. Disclosure of Your Information
Non-Sale of Personal Information
We do not sell or rent your personal information to third parties.
Permitted Sharing
We may share your personal information in the following circumstances:
In the event of a merger, acquisition, or similar transaction.
With service providers who assist us in operating our services.
To comply with applicable legal obligations.
V. Data Security Measures
We are committed to ensuring the security of your data. To achieve this, we implement robust security measures, which include but are not limited to:
- Encryption: We utilize industry-standard encryption protocols to protect sensitive information during transmission and storage.
- Firewalls: Our systems are protected by advanced firewall technologies to prevent unauthorized access.
- Cookies: We employ cookies to enhance the user experience on our website. Upon your first visit, we will seek your consent to use cookies in accordance with our Cookie Policy.
By utilizing our services, you acknowledge and agree to our data security practices as outlined above.
VI. Data Access and Use
- Limit Data Collection: We are committed to collecting only the necessary data required for our services.
- Secure Transmission: All data transfers are conducted using HTTPS to ensure secure transmission.
- Explicit Permissions: Access to sensitive data is contingent upon obtaining your explicit consent.
- No Sale of Personal Data: We do not engage in the sale of personal data to any third parties.
- Site Security & App Location Tracking: For information regarding site security and app location tracking, please refer to our Terms & Conditions, specifically Sections VII. Site Security & App Location Tracking and VII: PART B: Location Tracking.
VII. Disclosure and Consent
- Clear In-App Disclosure: We ensure that users receive visible disclosures regarding data access and collection practices within the application. These disclosures are designed to be transparent and easily understandable.
- Straightforward Consent Requests: All requests for user consent are presented in a clear manner and require explicit action from the user to provide their consent. Users are informed about the implications of their consent prior to any data collection.
VIII. Compliance with Third-Party SDKs
We hereby affirm our commitment to comply with all disclosure and consent requirements related to third-party Software Development Kits (SDKs). In the event of any request from Google Play, we will ensure that such compliance is achieved within a period not exceeding two weeks.
IX. Your Rights
You are entitled to the following rights regarding your personal data:
- Access: You have the right to request access to the personal data we hold about you.
- Correction: You have the right to request correction of any inaccurate or incomplete personal data.
- Deletion: You have the right to request deletion of your personal data under certain circumstances.
- Objection to Processing: You have the right to object to the processing of your personal data.
To exercise any of these rights, please contact us at:
Email: info@gyantgroup.com
X. Changes to This Privacy Policy
We reserve the right to update or modify this Privacy Policy at any time. Any changes will be effective immediately upon posting the new version on this website. We encourage you to review this Privacy Policy periodically to remain informed about our practices.
XI. Prohibited Activities
I. Introduction
This document outlines the prohibited activities under the Global Data Privacy Policy and related legal standards. Compliance with these policies is mandatory for all employees and contractors.
II. Prohibited Activities
- Global Data Privacy Policy Violation
All employees must adhere to established data privacy policies. - Inappropriate Content
Any form of sexually explicit or discriminatory communication is strictly prohibited. - Unauthorized Disclosure
Sharing confidential information, including but not limited to risks, regulatory details, and login credentials, is not permitted. This includes compliance with the Computer Fraud and Abuse Act (CFAA) at all levels of government. - Insecure Transmission
Sensitive data must not be transmitted without appropriate encryption methods. - Defamation
Posting false information or making defamatory statements, whether internally or externally, is prohibited. - Security Breach
Unauthorized access to accounts is strictly forbidden. - Copyright Compliance
All employees must respect and comply with intellectual property laws. - Solicitation
Personal solicitations using Company Systems are not allowed. - Identity Misrepresentation
Impersonating others is strictly prohibited. - Unauthorized Access
Accessing files or information not intended for the employee is not permitted. - Illegal Activities
Employees must not support or engage in any illegal actions. - Post-Employment Use
Use of Company Systems after the termination of employment is prohibited. - Social Media Registration
Employees are not allowed to register for social media accounts using Company emails without prior approval. - Intellectual Property Use
The use of Company logos or trademarks without consent is strictly forbidden.
III. Conclusion
Failure to comply with these prohibitions may result in disciplinary action, up to and including termination of employment. All employees are expected to understand and adhere to these guidelines to maintain a secure and respectful workplace.
XII. Definitions
“Data Privacy Laws” means laws relating to data privacy, trans-border data flow or data protection, such as the Gramm-Leach-Bliley Act of 1999 Pub. L. No. 106-102, 12 U.S.C. 1843(k)(1), GENERAL DATA PROTECTION REGULATION (“GDPR”) (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, repealing European Union Directive on the Protection of Personal Data, Council Directive 95/46/EC, 1995 O.J. (L281), and more specific rules or laws by member state laws (such as in the case of employee data, as applicable), the Personal Information Protection and Electronic Documents Act (PIPEDA) of Canada, and the fair information principles published by the United States Federal Trade Commission, and any and all successor or supplemental laws relating thereto, and any additional laws or regulations that may be promulgated in the future including, without limitation, those of the United Kingdom, such as the Information Commissioner’s Office (ICO) Data Protection Act 2018 (Commencement No. 1 and Transitional and Saving Provisions) Regulations 2018.
“Information Security Incident” means: (a) the attempted or actual unauthorized acquisition, access, use, Processing, loss or disclosure of Confidential Information; (b) the suspicion or reasonable belief that there has been an attempted or actual unauthorized acquisition, access, use, Processing, loss, or disclosure of Confidential Information; or (c) the unauthorized use or attempted use of any Service Provider Systems to gain access to any Company System.
Compliance with Privacy Laws and Regulatory Compliance and Changes. Gyant® will comply, and will cause all Affiliates of Gyant® Provider and their Personnel to comply with: (a) all applicable international, federal, state, provincial and local laws, rules, regulations, directives and governmental requirements currently in effect and as they become effective relating in any way to the privacy, confidentiality or security of Company Data including, without limitation, the Regulation (EU) 2016/679 of the European Parliament (General Data Protection Regulation), the European Union Directives governing security of network and information systems (Directive 2016/1148), privacy and electronic commerce and communications (Directive 2002/58/EC), and data retention (Directive 2006/24/EC); the Canadian Company Personal Data Protection and Electronic Documents Act (PIPEDA) and relevant provincial laws; the Gramm-Leach-Bliley Act (“GLBA”), 15 U.S.C. § § 6801-6827, and all regulations implementing GLBA; the Fair Credit Reporting Act (“FCRA”), 15 U.S.C. § 1681 et seq., as amended by the Fair and Accurate Credit Transactions Act (“FACTA”), and all regulations implementing the FCRA and FACTA; the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM); information security breach notification laws (such as Cal. Civ. Code §§ 1798.29, 1798.82 – 1798.84); laws imposing minimum information security requirements (such as Cal. Civ. Code § 1798.81.5 and 201 Mass. Code Reg. 17.00); laws requiring the secure disposal of records containing certain Company Data (such as, but not limited to, N.Y. Gen. Bus. Law § 399-H), and all similar international, federal, provincial, state and local requirements; (b) all applicable industry standards concerning privacy, data protection, confidentiality or information security; and (c) applicable provisions of Company’s written requirements or the written requirements of any Affiliate of Company currently in effect and as they become effective relating in any way to the privacy, confidentiality and security of Company Data or applicable privacy policies, statements or notices that are provided to Service Provider in writing.