Privacy Policy

Your privacy and data security are fundamental to our business. Learn how we collect, use, and protect your information.

Last updated: December 15, 2024

Privacy at a Glance

Data Protection

Enterprise-grade security with encryption and access controls

Your Control

Full access, correction, and deletion rights over your data

Transparency

Clear disclosure of how we collect and use information

Information We Collect

Personal Information

We collect personal information that you voluntarily provide when using our services, including name, email address, phone number, company information, job title, and billing information.

Technical Information

We automatically collect technical data including IP addresses, browser type and version, device information, operating system, referring URLs, and usage patterns to improve our services.

Project Information

When you engage our services, we collect information about your business requirements, project specifications, and any data necessary to deliver our solutions effectively.

Communication Data

We maintain records of our communications with you, including emails, phone calls, meeting notes, and support interactions to provide better service.

How We Use Your Information

Service Delivery

We use your information to provide, maintain, and improve our technology solutions, process transactions, and deliver customer support.

Communication

We communicate with you about our services, send important updates, respond to inquiries, and provide technical support as needed.

Business Operations

Your information helps us manage our business relationships, process payments, maintain accurate records, and comply with legal obligations.

Service Improvement

We analyze usage patterns and feedback to enhance our services, develop new features, and optimize user experience.

Data Security & Protection

Security Measures

We implement industry-standard security measures including encryption, secure servers, access controls, and regular security audits to protect your data.

Data Encryption

All sensitive data is encrypted both in transit using TLS 1.3 and at rest using AES-256 encryption standards to ensure maximum protection.

Access Controls

We maintain strict access controls with role-based permissions, multi-factor authentication, and regular access reviews to limit data exposure.

Incident Response

We have comprehensive incident response procedures to quickly identify, contain, and address any potential security breaches.

Information Sharing

Service Providers

We may share information with trusted third-party service providers who assist in our operations, subject to strict confidentiality agreements.

Legal Requirements

We may disclose information when required by law, court order, or government regulation, or to protect our rights and the rights of others.

Business Transfers

In the event of a merger, acquisition, or sale of assets, user information may be transferred as part of the transaction with appropriate notice.

Consent-Based Sharing

We will never sell, rent, or share your personal information for marketing purposes without your explicit consent.

Your Rights & Choices

Access & Correction

You have the right to access, review, and correct your personal information. Contact us to request updates or modifications to your data.

Data Portability

You can request a copy of your personal data in a structured, machine-readable format for your own use or transfer to another service.

Deletion Rights

You may request deletion of your personal information, subject to legal retention requirements and ongoing business relationships.

Communication Preferences

You can opt-out of marketing communications at any time while continuing to receive important service-related communications.

Data Retention

Retention Periods

We retain personal information for as long as necessary to provide services, comply with legal obligations, resolve disputes, and enforce agreements.

Project Data

Project-related information is retained for the duration of our engagement plus applicable warranty periods and legal retention requirements.

Automatic Deletion

We implement automated deletion processes for certain types of data after predetermined retention periods to minimize data exposure.

Secure Disposal

When data is deleted, we use secure deletion methods to ensure information cannot be recovered or reconstructed.

Questions About Your Privacy?

Our privacy team is here to help. Contact us with any questions about how we handle your data.

Email Us

privacy@thinctech.com

Response within 24 hours

Call Us

+61 423 778 340 (Australia)

+84 964 595 374 (Vietnam)

Business hours: 9 AM - 6 PM PST

This Privacy Policy is effective as of December 15, 2024 and may be updated from time to time. We will notify you of any material changes via email or through our service.