This website www.kiratitsolutions.com is administered by Kirat IT
Solutions Pvt Ltd.
We are committed to protecting your
privacy when you visit our site. We have created this privacy
statement to demonstrate our commitment to your privacy.
How we gather information?
You can visit
www.kiratitsolutions.com without having to reveal any information about
yourself or tell us who you are. However, there are times when we
need information from you either to access certain sections of the
website or when you need to contact us. We gather information
indirectly through the use of technology and directly, for example
when you enter information in our contact forms. If you do not wish
to have your anonymous transaction details used in this manner, you
can either disable cookies on your browser or exit the particular
page.
How we collect anonymous
information?
We use IP address of visitors and sometimes
collect anonymous information from visits to our site to help
provide better customer service by diagnosing problems with our
server and better administer our website. We use this information to
analyse trends and statistics to help understand user needs and
patterns. We maintain the highest level of confidentiality for this
information.
How we use
information you share?
Our website's contact forms may
require you to give personal information or contact information such
as name, e-mail or phone numbers. We use this information to either
get in touch based on your request or send you information that you
have requested or subscribed to. You can write to us if you wish to
unsubscribe from our mailing list.
How
we secure information you share?
We intend to protect any
personally identifiable information that you may share with us. Our
website has best in class security measures to maintain the security
of your data and help protect against loss, misuse or alteration of
data under our control. The data is stored behind a firewall and can
only be accessed by authorized Defiance Technologies personnel.
However, the nature of Internet is such that it allows data to pass
through networks without adequate security measures and may be
accessed and used by people other than those for whom the data is
intended.