Last Updated: November 26, 2025
At Destek Technologies Private Limited, we are committed to protecting your privacy and ensuring the security of your personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our cloud computing services, visit our website, or engage with our products and services.
By using our services, you agree to the collection and use of information in accordance with this policy. If you do not agree with our policies and practices, please do not use our services.
1. Information We Collect
1.1 Personal Information
We may collect personal information that you provide directly to us, including but not limited to:
- Name, email address, phone number, and business contact details
- Company name, job title, and business information
- Billing address, payment information, and tax identification details
- Username, password, and account credentials
- Communication preferences and marketing choices
1.2 Technical Information
When you use our services, we automatically collect certain technical information:
- IP address, browser type, and operating system
- Device information and unique identifiers
- Log data including access times, pages viewed, and URLs
- Usage data, performance metrics, and service utilization statistics
- Cookies and similar tracking technologies
1.3 Customer Data
When you use our cloud services, you may upload, store, or process data through our infrastructure. This includes:
- Files, documents, and application data
- Database content and configurations
- Virtual machine images and backups
- Email and communication data (for O365/G-Suite services)
Important: Your customer data remains your property. We act as a data processor and only access your data when necessary to provide services, ensure security, or comply with legal obligations.
2. How We Use Your Information
We use the information we collect for the following purposes:
2.1 Service Delivery
- Provide, maintain, and improve our cloud computing services
- Process transactions and send billing invoices
- Manage your account and provide customer support
- Monitor service performance and availability
- Perform backups, disaster recovery, and data migration
2.2 Communication
- Send service notifications, updates, and security alerts
- Respond to inquiries and provide technical support
- Send marketing communications (with your consent)
- Conduct surveys and gather feedback
2.3 Security and Compliance
- Detect, prevent, and respond to security incidents
- Investigate and prevent fraudulent activities
- Comply with legal obligations and regulatory requirements
- Enforce our Terms of Service and Acceptable Use Policy
2.4 Analytics and Improvement
- Analyze usage patterns and service performance
- Develop new features and enhance existing services
- Conduct research and statistical analysis
- Optimize infrastructure and resource allocation
3. Information Sharing and Disclosure
We do not sell, trade, or rent your personal information to third parties. We may share your information only in the following circumstances:
3.1 Service Providers
We may share information with trusted third-party service providers who assist us in:
- Payment processing and billing services
- Cloud infrastructure providers (AWS, Azure, Google Cloud)
- Customer support and ticketing systems
- Analytics and monitoring tools
- Email delivery and communication services
3.2 Legal Requirements
We may disclose your information when required by law or in response to:
- Valid legal processes (court orders, subpoenas, warrants)
- Government or regulatory requests
- Protection of our rights, property, or safety
- Emergency situations involving public safety
3.3 Business Transfers
In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity. We will notify you of any such change in ownership.
3.4 With Your Consent
We may share your information with third parties when you explicitly consent to such sharing.
4. Data Security
We implement comprehensive security measures to protect your information:
- Encryption: Data is encrypted in transit (TLS/SSL) and at rest (AES-256)
- Access Controls: Role-based access and multi-factor authentication
- Network Security: Firewalls, intrusion detection, and DDoS protection
- Monitoring: 24/7 security monitoring and incident response
- Compliance: Regular security audits and compliance certifications
- Backup: Regular automated backups with secure storage
- Staff Training: Security awareness training for all employees
Note: While we implement industry-standard security measures, no method of transmission over the internet or electronic storage is 100% secure. We cannot guarantee absolute security of your data.
5. Data Retention
We retain your information for as long as necessary to fulfill the purposes outlined in this Privacy Policy:
- Active Accounts: Information is retained while your account is active
- Closed Accounts: Personal data is deleted within 30 days of account closure
- Backup Data: Backup copies may be retained for up to 90 days
- Legal Requirements: Some data may be retained longer to comply with legal obligations
- Financial Records: Billing and tax records retained for 7 years as required by law
6. Your Rights and Choices
You have the following rights regarding your personal information:
6.1 Access and Correction
- Request access to your personal information
- Update or correct inaccurate information
- Export your data in a portable format
6.2 Deletion
- Request deletion of your personal information
- Close your account and remove associated data
- Note: Some information may be retained as required by law
6.3 Marketing Communications
- Opt-out of marketing emails by clicking "unsubscribe"
- Manage communication preferences in your account settings
- You will still receive essential service-related communications
6.4 Cookies and Tracking
- Adjust browser settings to block or delete cookies
- Use privacy tools and browser extensions
- Note: Disabling cookies may affect service functionality
7. Cookies and Tracking Technologies
We use cookies and similar technologies to enhance your experience:
7.1 Types of Cookies We Use
- Essential Cookies: Required for basic website functionality
- Performance Cookies: Collect anonymous usage statistics
- Functional Cookies: Remember your preferences and settings
- Analytics Cookies: Help us understand how you use our services
7.2 Third-Party Cookies
We may use third-party services that set cookies, including:
- Google Analytics for website analytics
- Payment processors for secure transactions
- Social media platforms for sharing functionality
8. International Data Transfers
Your information may be transferred to and processed in countries outside of India. We ensure that:
- Data transfers comply with applicable data protection laws
- Appropriate safeguards are in place (standard contractual clauses)
- Service providers maintain adequate security measures
- You are informed of cross-border data processing
9. Children's Privacy
Our services are not intended for individuals under the age of 18. We do not knowingly collect personal information from children. If we become aware that we have collected information from a child, we will take steps to delete such information promptly.
10. Third-Party Links
Our website may contain links to third-party websites. We are not responsible for the privacy practices of these external sites. We encourage you to review the privacy policies of any third-party sites you visit.
11. Changes to This Privacy Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. We will:
- Post the updated policy on our website with a new "Last Updated" date
- Notify you of material changes via email or service notification
- Provide a reasonable notice period before changes take effect
- Obtain your consent for significant changes affecting your rights
Your continued use of our services after policy changes constitutes acceptance of the updated terms.
12. Compliance and Certifications
Destek Technologies is committed to maintaining compliance with:
- Information Technology Act, 2000 (India)
- Personal Data Protection Bill (when enacted)
- ISO 27001 Information Security Management
- Industry best practices and standards