1. Information We Collect
We collect specific data to ensure effective service delivery:
- Personal Information: Name, email address, contact number, and institution/organization name.
- Project Data: University guidelines, raw data, research materials, proprietary algorithms, and specific code requirements provided by you.
- Technical Data: For custom software/web solutions, we may collect server logs, IP addresses, and usage metrics during the development and testing phases.
2. How We Use Your Information
Your data is utilized strictly for the following purposes:
- Service Delivery: To create reports, draft journals, develop software, and provide consultation.
- Communication: To send project updates, revision drafts, and invoice details.
- Quality Assurance: To test software functionality and ensure documentation meets academic/industry standards.
- Legal Compliance: To comply with financial regulations regarding transaction records.
3. Confidentiality & Non-Disclosure
Your privacy is our absolute priority. We strictly adhere to the following:
- No Third-Party Sharing: We do not sell, rent, or trade your personal information to marketing agencies.
- Academic Anonymity: Your identity and academic affiliation are kept strictly confidential. Completed reports are not published in public repositories by us without consent.
- Proprietary Code: For tech consulting, any proprietary business logic or trade secrets shared with us remain your intellectual property.
4. Data Retention Policy
To maintain efficiency and privacy:
- Project Files: We retain project files (documents, code, data) for 6 months after delivery to facilitate revisions or loss recovery. After this period, files are permanently deleted from our secure servers.
- Client Records: Basic contact and transaction details are retained as required by tax and legal regulations.
5. Third-Party Services
We may use trusted third-party services for specific functions:
- Payment Gateways: Financial transactions are processed via secure, encrypted gateways. We do not store your credit card or banking login details.
- Hosting Providers: For tech solutions, temporary deployment may occur on cloud platforms (e.g., AWS, Vercel) securely managed by us during development.
6. Data Security
We implement industry-standard security measures, including encryption and restricted access controls, to protect your data against unauthorized access, alteration, or destruction.
7. Your Rights
You have the right to request access to the personal data we hold about you, request corrections to inaccurate data, or request the deletion of your project files earlier than our standard retention period.
8. Contact Us
If you have any questions about this Privacy Policy, please contact us at: