Privacy Policy

Effective Date: 05/03/2025

1. Introduction

Welcome to Celetrix Infosec Solutions Private Limited  . Your privacy is important to us. This Privacy Policy outlines how we collect, use, disclose, and protect your personal data in compliance with applicable data protection laws, including GDPR, India’s Digital Personal Data Protection Act (DPDPA), and other relevant regulations.

2. Information We Collect

We may collect and process the following types of information:

  • Personal Information: Name, email address, phone number, company details, job title, etc.
  • Technical Information: IP address, browser type, operating system, and other analytics data.
  • Security Compliance Data: Information related to cybersecurity assessments, compliance audits, penetration testing, vulnerability reports, and risk analysis.
  • Cookies and Tracking Technologies: Used to enhance user experience, monitor cybersecurity threats, and analyze website traffic. How We Use Your Information

We use your information for:

  • Providing cybersecurity consulting, risk assessment, and compliance services.
  • Conducting security audits, penetration testing, and vulnerability assessments.
  • Assisting organizations in meeting compliance requirements such as SOC 2, ISO 27001, PCIDSS, HIPAA, and GDPR.
  • Enhancing threat intelligence, incident response, and forensic investigations.
  • Responding to inquiries and customer support requests.
  • Sending security alerts, compliance updates, newsletters, and promotional materials.
  • Ensuring compliance with legal and regulatory obligations.

4. Data Sharing and Disclosure

We do not sell or rent your personal data. However, we may share your data with:

  • Security Auditors & Compliance Partners: Organizations assisting with regulatory audits and certifications.
  • Cybersecurity Solution Providers: Vendors offering security tools and platforms for risk management.
  • Government & Regulatory Authorities: If required by law, for compliance purposes.
  • Third-Party Service Providers: Including cloud hosting, security analytics, and forensic investigation firms.

5. Data Security

We implement strict security measures, including:

  • Encryption of sensitive data.
  • Multi-factor authentication (MFA) for access control.
  • Regular security audits and vulnerability assessments.
  • Intrusion detection and threat monitoring systems.

6. Your Rights

Depending on your jurisdiction, you may have rights to:

  • Access, update, or delete your personal data.
  • Object to processing or request data portability.
  • Withdraw consent for data collection.
  • Request information on cybersecurity risks and security measures applied to your data.

7. Cookies and Tracking Technologies

We use cookies to:

  • Detect and prevent cybersecurity threats.
  • Improve security monitoring and threat intelligence.
  • Enhance website performance and user experience.
  • You can manage cookie settings via your browser.

8. Third-Party Links

Our website may contain links to external cybersecurity-related resources. We are not responsible for their privacy practices.

9. Changes to This Policy

We may update this Privacy Policy periodically. Any changes will be posted on our website with an updated effective date.