Dextarim

Network Security Specialists

Privacy Policy

Your privacy matters to us at Dextarim

Effective Date: January 15, 2025

Information We Collect

At Dextarim, we collect various types of information to provide you with the best firewall and network protection services. This includes information you provide directly to us, data collected automatically through your use of our services, and information we receive from third parties when necessary for service delivery.

Personal Information

Name, email address, phone number, business address, payment information, and account credentials you provide when registering for our services or contacting our support team.

Technical Data

IP addresses, device identifiers, browser information, operating system details, network configuration data, and firewall logs necessary for providing network protection services.

Usage Information

Service usage patterns, feature preferences, support interactions, training session attendance, and performance metrics related to your network security setup.

Communication Data

Email correspondence, support tickets, feedback forms, survey responses, and any other communications you have with our team or through our platforms.

How We Use Your Information

We use the information we collect for several important purposes that directly benefit your experience with our firewall and network protection services. Our primary focus is on delivering reliable security solutions while maintaining transparency about how your data supports these services.

Service Delivery: We use your information to provide, maintain, and improve our firewall and network protection services, including real-time threat monitoring and incident response.
Account Management: Personal information helps us manage your account, process payments, and provide customer support tailored to your specific network security needs.
Security Enhancement: Technical data allows us to analyze threats, improve our protection algorithms, and customize security measures for your specific network environment.
Communication: We use contact information to send important security alerts, service updates, and respond to your support requests or inquiries about our services.
Legal Compliance: Information may be used to comply with applicable laws, regulations, and legal processes, particularly those related to cybersecurity and data protection requirements in India.

Data Sharing and Third Parties

We maintain strict controls over how your information is shared. Dextarim does not sell, rent, or trade your personal information to third parties for their marketing purposes. However, we may share your information in specific circumstances that are essential for our service delivery and your security.

We work with trusted service providers who assist us in delivering our firewall and network protection services. These partners include cloud infrastructure providers, payment processors, and cybersecurity research organizations. All third parties are bound by strict confidentiality agreements and are only permitted to use your information for the specific services they provide to us.

In cases where we detect serious security threats or illegal activities, we may need to share relevant information with law enforcement agencies or cybersecurity authorities. We will always notify you of such disclosures unless prohibited by law or if notification would compromise ongoing security investigations.

If Dextarim undergoes a business transition such as a merger, acquisition, or sale of assets, your information may be transferred as part of that transaction. We will provide notice before your personal information becomes subject to a different privacy policy.

Your Rights and Choices

You have significant control over your personal information and how it's used within our services. We believe in empowering our users with comprehensive rights regarding their data, and we've built systems to make exercising these rights as straightforward as possible.

  • Access and Portability

    You can request a copy of all personal information we hold about you. We'll provide this information in a structured, commonly used format that allows you to transfer your data to another service provider if desired.

  • Correction and Updates

    If any of your personal information is inaccurate or outdated, you can request corrections through your account settings or by contacting our support team. We'll update your information promptly to ensure accuracy.

  • Deletion and Erasure

    You may request deletion of your personal information, subject to certain legal and operational requirements. We'll honor deletion requests while maintaining necessary records for security and compliance purposes.

  • Processing Restrictions

    You can request limitations on how we process your information in certain circumstances. This might include restricting processing while we verify data accuracy or limiting use for specific purposes.

  • Communication Preferences

    You can control the types of communications you receive from us, including marketing emails and non-essential service notifications. Critical security alerts and service updates will continue to be sent for your protection.

Data Security Measures

As a cybersecurity company, we understand the critical importance of protecting your information. We employ multiple layers of security controls designed to safeguard your data against unauthorized access, alteration, disclosure, or destruction.

Encryption: All data transmission uses industry-standard TLS encryption, and sensitive data at rest is protected using AES-256 encryption with regularly rotated keys.
Access Controls: We implement strict role-based access controls, multi-factor authentication, and regular access reviews to ensure only authorized personnel can access your information.
Network Security: Our infrastructure includes firewalls, intrusion detection systems, and continuous monitoring to protect against external threats and unauthorized access attempts.
Regular Audits: We conduct quarterly security assessments, penetration testing, and compliance audits to identify and address potential vulnerabilities in our systems.
Incident Response: Our security team maintains 24/7 monitoring and has established procedures for detecting, responding to, and recovering from any potential data security incidents.

Data Retention

We retain your information only for as long as necessary to fulfill the purposes outlined in this privacy policy, comply with legal obligations, and maintain the security and integrity of our services. Different types of information are retained for varying periods based on their purpose and legal requirements.

Data Type Retention Period Purpose
Account Information Active account + 3 years Service delivery and support
Security Logs 12 months Threat analysis and compliance
Payment Records 7 years Financial and tax compliance
Support Communications 2 years Service improvement and training
Marketing Preferences Until withdrawn Communication management

When retention periods expire, we securely delete or anonymize your information using industry-standard data destruction methods. In some cases, we may retain anonymized or aggregated data for research and service improvement purposes beyond these periods.

International Data Transfers

While our primary operations are based in India, we may need to transfer your information to other countries to provide our services effectively. This might occur when using cloud services, partnering with international cybersecurity organizations, or responding to global security threats.

Any international transfers are conducted with appropriate safeguards in place, including standard contractual clauses, adequacy decisions, or other legally approved mechanisms. We ensure that your information receives the same level of protection regardless of where it's processed.

If you're located outside India and use our services, your information may be transferred to and processed in India. By using our services, you consent to such transfers, subject to the protections outlined in this privacy policy.

Children's Privacy

Our services are designed for businesses and adult users. We do not knowingly collect personal information from children under the age of 18. If we discover that we have collected information from a child without proper parental consent, we will take immediate steps to delete that information from our systems.

If you're a parent or guardian and believe your child has provided us with personal information, please contact us immediately using the information provided in this policy. We will investigate and take appropriate action to protect the child's privacy.

Policy Updates

We may update this privacy policy from time to time to reflect changes in our practices, services, or applicable laws. When we make significant changes, we'll notify you through your registered email address or by posting a prominent notice on our website at least 30 days before the changes take effect.

We encourage you to review this policy periodically to stay informed about how we're protecting your information. The "Effective Date" at the top of this policy indicates when the current version was last updated. Your continued use of our services after policy changes take effect constitutes acceptance of the updated terms.

Privacy Questions and Contact

If you have questions about this privacy policy, want to exercise your privacy rights, or need to report a privacy concern, please contact us:

Email: [email protected]
Address: 901, KB Complex, Motichowk, above Muthoot finance bank, Dr. Ambedkar Nagar, India
Phone: +917992348286

We respond to privacy inquiries within 48 hours and will work with you to address any concerns about your personal information.