Data Protection Policy 

 

At Yugalinks Global Connect Pvt Ltd, we prioritize the protection and privacy of user data. This policy outlines how we safeguard user information through advanced security measures, ensuring compliance with applicable data protection laws and maintaining user trust. 

 

Policy Commitment

We are committed to protecting all personal and business-related information shared with us. Our data protection practices ensure confidentiality, integrity, and secure access to user data at all times.

Scope of the Policy

This policy applies to all data collected, processed, stored, and shared by Yugalinks Global Connect Pvt Ltd, including:

  • Buyer and seller information
  • Partner and affiliate data
  • Any third-party service interactions

Data Collection and Processing

We collect and process user data only for legitimate business purposes, including but not limited to:

  • User registration and account management
  • Transaction processing and export documentation
  • Service improvements and customer support

Secure Storage Practices

User data is stored securely in compliance with data protection regulations:

  • Access Control: Data is stored in protected environments with multi-factor authentication and restricted access.
  • Data Backup: Regular encrypted backups are performed to prevent data loss.

Access Control and Authorization

Access to user data is limited to authorized personnel only, following strict access protocols:

  • Role-Based Access Control (RBAC): Employees can only access data relevant to their job functions.
  • Audit Trails: All access and modifications are logged and regularly audited.

Data Sharing and Third Parties

User data is not shared with third parties without explicit consent, except where legally required. Any third-party services engaged for operational needs must comply with our data protection standards.

User Rights and Data Control

Users have the following rights regarding their data:

  • Access: Users can request access to their personal data.
  • Correction: Users may request corrections to inaccurate or incomplete data.
  • Deletion: Users can request the deletion of their data when it is no longer required.

Data Breach Response Plan

In the event of a data breach, we follow a comprehensive response plan:

  • Immediate containment and mitigation of risks
  • Notification to affected users and regulatory bodies, if required
  • Implementation of corrective measures and further security enhancements

Policy Review and Compliance

This policy is reviewed and updated regularly to maintain compliance with evolving data protection standards. We ensure adherence to applicable laws, including the Information Technology Act, 2000, and international regulations.