This website www.kiratitsolutions.com is administered by Kirat IT
Solutions Pvt Ltd.
We are committed to protecting your privacy when you visit our site. We have created this privacy statement to demonstrate our commitment to your privacy.
How we gather information?
You can visit www.kiratitsolutions.com without having to reveal any information about yourself or tell us who you are. However, there are times when we need information from you either to access certain sections of the website or when you need to contact us. We gather information indirectly through the use of technology and directly, for example when you enter information in our contact forms. If you do not wish to have your anonymous transaction details used in this manner, you can either disable cookies on your browser or exit the particular page.
How we collect anonymous information?
We use IP address of visitors and sometimes collect anonymous information from visits to our site to help provide better customer service by diagnosing problems with our server and better administer our website. We use this information to analyse trends and statistics to help understand user needs and patterns. We maintain the highest level of confidentiality for this information.
How we use information you share?
Our website's contact forms may require you to give personal information or contact information such as name, e-mail or phone numbers. We use this information to either get in touch based on your request or send you information that you have requested or subscribed to. You can write to us if you wish to unsubscribe from our mailing list.
How we secure information you share?
We intend to protect any personally identifiable information that you may share with us. Our website has best in class security measures to maintain the security of your data and help protect against loss, misuse or alteration of data under our control. The data is stored behind a firewall and can only be accessed by authorized Defiance Technologies personnel. However, the nature of Internet is such that it allows data to pass through networks without adequate security measures and may be accessed and used by people other than those for whom the data is intended.