Passive Information Collection Policy
The purpose of such passively collected anonymous information is purely to provide better service to website visitors, necessarily to customize the website based on user preferences, compilation and analysis of data, statistics and trends, and otherwise administer and improve the website. The information collected does not provide personal information or identification and is also not combined with any personally identifiable information collected on forms elsewhere on the website with your consent.
(a) Utilizing of Personal Information: The personal information is properly obtained and utilized for proper purposes to the extent necessary to provide services and/or to the extent necessary to achieve certain specified purposes.
(b) Provision of Personal Information to a Third Party: The information collected shall never be provided to any third party without obtaining the consent of the individual concerned. In special cases, information may be provided to such third party who has appropriate and adequate standards for the protection of such personal information and executes an appropriate contract. However, necessary and appropriate supervision shall be ensured towards implementing safety control measures with respect to such personal information.
(c) Managing Personal Information: The company prevents any leak or loss of, and damage to personal information, and implements necessary and appropriate measures to ensure that personal information is securely managed. In case of such as a leak of personal information occur, the company endeavors to minimize the damage by taking prompt action.
(d) Disclosure, Revision, and Deletion of Personal Information: When asked by a relevant individual to disclose his or her personal information, the company promptly discloses such personal information only after confirming such individual’s identification. When asked by a relevant individual to revise or delete his or her personal information, the company revises or deletes such personal information to the extent necessary only after confirming such individual’s identification.
(e) Compliance with the Existing Laws: The company endeavors to protect personal information by continuously improving the framework for the protection of personal information. The company complies with the laws and regulations pertaining to the protection of personal information.
Information Security Policy
The company provides comprehensive consulting services, by utilizing the company’s intellectual property based on confidential information disclosed by its clients. The company consistently implements business ethics in its professional approach and business conduct. It has been attempting to establish an information management framework, recognizing the need to expressly reiterate its understanding that information security is one of the most important issues concerning the management and the business operations. The company establishes a basic policy on information security and will appropriately protect all information assets that it deals with by ensuring that it’s directors, officers and employees abide by the information security policy set out as below.
(a) Establishing of Information Security Management System: The company ensures that all directors, officers and employees understand the importance of information security and establish adequate system to ensure appropriate management of information assets and continuously seek to improve it.
(b) Legal and Regulatory Compliance: The company ensures that its framework for information security is in compliance and conformity in letter and spirit with the relevant local laws, regulations and other various standards.
(c) Information Assets Protection: In order to protect information assets of the company and it’s clients from threats to confidentiality, integrity and availability of such information assets and to ensure the continuity of its business, shall formulated appropriate management plans for it’s information assets, clients as well a business partners.
(d) Education and Training: The company continuously trains and educates its directors, officers and employees to raise their awareness of information security and implement an information security system in all of its business activities.
(e) Incident Response: The company implements appropriate measures to prevent incidents relating to information security but also takes steps to prevent the recurrence of similar incidents.
We do not object to you linking directly to the information that is hosted on our site and no prior permission is required for the same. However, we would like you to inform us about any links provided to our site. We do not permit our pages to be loaded into frames on your site. Our website’s pages must load into a newly opened browser window of the user.
Contents of this website may not be reproduced partially or fully, without due permission from e-Committee, Supreme Court of India. If referred to as a part of another website, the source must be appropriately acknowledged. The contents of this website can not be used in any misleading or objectionable context.