Privacy Policy

Your privacy matters to us. This policy explains how Domain collects, uses, and protects your personal information when you use our cybersecurity outsourcing services.

Effective Date: January 15, 2025 | Last Updated: January 15, 2025

Information We Collect

Personal Information

We collect information you provide directly when engaging with our cybersecurity services. This includes contact details, business information, and technical requirements you share during consultations.

  • Name, email address, and phone number
  • Company name and business address
  • Job title and department information
  • Technical specifications and security requirements
  • Communication preferences and service interests

Technical Data

Our cybersecurity assessments require collecting technical information about your systems. This data helps us provide accurate security recommendations and protect your infrastructure effectively.

  • Network configuration and architecture details
  • Security vulnerability assessment results
  • System logs and performance metrics
  • Software inventory and version information
  • Security incident reports and response data

Data Minimization Commitment

We only collect information necessary for providing our cybersecurity services. Any technical data collected during security assessments is processed with strict confidentiality protocols and deleted according to our retention schedule.

How We Use Your Information

Service Delivery

Your information enables us to deliver comprehensive cybersecurity solutions tailored to your business needs. We analyze technical data to identify vulnerabilities and recommend appropriate security measures.

  • Conducting security assessments and penetration testing
  • Developing customized security policies and procedures
  • Monitoring systems for potential security threats
  • Providing incident response and recovery services
  • Delivering security training and awareness programs

Communication and Support

We use contact information to maintain professional relationships and provide ongoing support. This includes security alerts, service updates, and consultation scheduling.

  • Sending security alerts and threat notifications
  • Scheduling consultations and service appointments
  • Providing technical support and troubleshooting
  • Sharing relevant cybersecurity insights and updates
  • Processing service requests and inquiries

Compliance with Indian Data Protection Laws

Our data processing activities comply with the Information Technology Act, 2000, and associated rules. We implement technical and organizational measures to ensure data protection and maintain detailed records of all processing activities.

Data Sharing and Disclosure

Third-Party Service Providers

We work with trusted partners to deliver comprehensive cybersecurity solutions. These providers are bound by strict confidentiality agreements and data protection standards.

  • Cloud security platforms for threat monitoring
  • Specialized forensics firms for incident investigation
  • Training providers for cybersecurity education
  • Technology vendors for security tool implementation
  • Legal advisors for compliance and regulatory matters

Legal Requirements

We may disclose information when required by Indian law, regulatory authorities, or court orders. This includes cooperation with law enforcement agencies investigating cybersecurity incidents.

  • Compliance with Indian Cyber Security rules and regulations
  • Cooperation with CERT-In incident reporting requirements
  • Response to lawful requests from government agencies
  • Protection of our legal rights and business interests
  • Prevention of fraud and illegal activities

Your Rights and Choices

Access and Control

You have significant control over your personal information. We provide transparent access to data we hold and respect your choices regarding its use.

  • Request copies of personal information we maintain
  • Correct inaccurate or outdated information
  • Limit how we use your information for marketing
  • Request deletion of data no longer needed for services
  • Transfer your data to another service provider

Exercising Your Rights

To exercise these rights, contact our privacy team using the information provided below. We respond to requests within 30 days and provide clear explanations of any limitations based on legal or business requirements.

Data Retention

We retain personal information for as long as necessary to provide services and meet legal obligations. Technical security data is typically deleted within 12 months of service completion, while business contact information may be retained longer for ongoing relationships.

Security Measures

Technical Safeguards

As a cybersecurity company, we implement industry-leading security measures to protect your information. Our systems undergo regular security assessments and compliance audits.

  • End-to-end encryption for data transmission and storage
  • Multi-factor authentication for system access
  • Regular security monitoring and incident response
  • Secure data centers with physical access controls
  • Regular backup and disaster recovery procedures

Organizational Measures

Our team follows strict security protocols and receives regular training on data protection practices. Access to personal information is limited to authorized personnel only.

  • Role-based access controls and regular access reviews
  • Employee background checks and security training
  • Confidentiality agreements for all staff members
  • Incident response procedures and breach notification protocols
  • Regular security awareness training and updates

International Data Transfers

While we primarily process data within India, some services may involve international transfers to trusted partners. We ensure adequate protection through contractual safeguards and compliance with cross-border data transfer regulations.

Transfer Safeguards

  • Standard contractual clauses for international transfers
  • Adequacy decisions and approved transfer mechanisms
  • Regular assessment of destination country privacy laws
  • Additional security measures for sensitive data transfers
  • Clear documentation of all international processing activities

Policy Updates

We review this privacy policy regularly to ensure it reflects our current practices and complies with applicable laws. Changes are communicated through email notifications and website updates.

Notification of Changes

Significant policy changes are communicated at least 30 days in advance. We encourage you to review updates and contact us with questions about how changes may affect your data.

Privacy Questions & Contact

For privacy-related inquiries, data requests, or concerns about this policy:

Domain Privacy Team

Periyar E.V.R. High Road, (NH 4 Highway)
Adayalampattu, Maduravoyal, Chennai, Tamil Nadu 600095, India

Phone: +91 99165 37777

Email: [email protected]

We respond to privacy inquiries within 72 hours during business days.