Data Protection Policy
At Yugalinks Global Connect Pvt Ltd, we prioritize the protection and privacy of user data. This policy outlines how we safeguard user information through advanced security measures, ensuring compliance with applicable data protection laws and maintaining user trust.
Policy Commitment
We are committed to protecting all personal and business-related information shared with us. Our data protection practices ensure confidentiality, integrity, and secure access to user data at all times.
Scope of the Policy
This policy applies to all data collected, processed, stored, and shared by Yugalinks Global Connect Pvt Ltd, including:
- Buyer and seller information
- Partner and affiliate data
- Any third-party service interactions
Data Collection and Processing
We collect and process user data only for legitimate business purposes, including but not limited to:
- User registration and account management
- Transaction processing and export documentation
- Service improvements and customer support
Secure Storage Practices
User data is stored securely in compliance with data protection regulations:
- Access Control: Data is stored in protected environments with multi-factor authentication and restricted access.
- Data Backup: Regular encrypted backups are performed to prevent data loss.
Access Control and Authorization
Access to user data is limited to authorized personnel only, following strict access protocols:
- Role-Based Access Control (RBAC): Employees can only access data relevant to their job functions.
- Audit Trails: All access and modifications are logged and regularly audited.
Data Sharing and Third Parties
User data is not shared with third parties without explicit consent, except where legally required. Any third-party services engaged for operational needs must comply with our data protection standards.
User Rights and Data Control
Users have the following rights regarding their data:
- Access: Users can request access to their personal data.
- Correction: Users may request corrections to inaccurate or incomplete data.
- Deletion: Users can request the deletion of their data when it is no longer required.
Data Breach Response Plan
In the event of a data breach, we follow a comprehensive response plan:
- Immediate containment and mitigation of risks
- Notification to affected users and regulatory bodies, if required
- Implementation of corrective measures and further security enhancements
Policy Review and Compliance
This policy is reviewed and updated regularly to maintain compliance with evolving data protection standards. We ensure adherence to applicable laws, including the Information Technology Act, 2000, and international regulations.