Data Security

  • Service Provider does not collect any information from Subscriber’s system including any personal, personal identity, or sensitive information of any kind.

  • Subscriber acknowledges and agrees that, in the course of providing Services, Service Provider may receive or have access to certain Personal Information. Personal Information means information that can identify Subscriber/ Authorized Persons, and may include, but is not limited to, name, image, date of birth, email and physical address, phone number, gender, credit or debit card information and any other information Subscriber opts to provide to Service Provider.

  • Service Provider agrees and covenants that it shall:

    1. keep and maintain all Personal Information in strict confidence, using such degree of care as is appropriate to avoid unauthorized access, use or disclosure including implementation of reasonable and appropriate security measures consistent with prevailing industry standards to protect data from unauthorized access by physical and electronic intrusion;

    2. access, use and disclose Personal Information solely and exclusively for the purposes for which Personal Information is provided and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Information for Service Provider’s own benefit or for the benefit of anyone other than Subscriber without Subscriber’s prior written consent

    3. not, directly or indirectly, disclose Personal Information to any person other than its authorized employees/persons including subcontractors, agents, outsourcers, auditors, etc. without express written consent from Subscriber unless and to the extent required by Government Authorities or as otherwise, to the extent expressly required, by applicable law.

  • Service Provider shall not, under any circumstances, be held responsible or liable for situations

    1. where data or transmissions are accessed by third parties through illegal or illicit means

    2. where the data or transmissions are accessed through the exploitation of security gaps, weaknesses, or flaws unknown to Service Provider at the time. Service Provider will promptly report to Subscriber any unauthorized access of its data promptly upon discovery, and shall use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access.