xenonstack-logo

Interested in Solving your Challenges with XenonStack Team

Get Started

Get Started with your requirements and primary focus, that will help us to make your solution

Please Select your Industry
Banking
Fintech
Payment Providers
Wealth Management
Discrete Manufacturing
Semiconductor
Machinery Manufacturing / Automation
Appliances / Electrical / Electronics
Elevator Manufacturing
Defense & Space Manufacturing
Computers & Electronics / Industrial Machinery
Motor Vehicle Manufacturing
Food and Beverages
Distillery & Wines
Beverages
Shipping
Logistics
Mobility (EV / Public Transport)
Energy & Utilities
Hospitality
Digital Gaming Platforms
SportsTech with AI
Public Safety - Explosives
Public Safety - Firefighting
Public Safety - Surveillance
Public Safety - Others
Media Platforms
City Operations
Airlines & Aviation
Defense Warfare & Drones
Robotics Engineering
Drones Manufacturing
AI Labs for Colleges
AI MSP / Quantum / AGI Institutes
Retail Apparel and Fashion

Proceed Next

banner-background-image

Privacy Policy

1. Who we are

Our website address is: https://www.xenonstack.com

The terms We / Us / Our / Company individually and collectively refer to XenonStack Pvt. Ltd. and the terms You / Your / Yourself refer to the users.

This Privacy Policy is an electronic record in the form of an electronic contract formed under the Information Technology Act, 2000 and the rules made thereunder and the amended provisions pertaining to electronic documents/records in various statutes as amended by the Information Technology Act, 2000. This Privacy Policy does not require any physical, electronic or digital signature.

This Privacy Policy is a legally binding document between you and XenonStack Pvt. Ltd. (both terms defined below). The terms of this Privacy Policy will be effective upon your acceptance of the same (directly or indirectly in electronic form, by clicking on the I accept tab or by use of the website or by other means) and will govern the relationship between you and XenonStack Pvt. Ltd. for your use of the Website (defined below).

This document is published and shall be construed in accordance with the provisions of the Information Technology (Reasonable security practices and procedures and sensitive personal data of information) rules, 2011 under Information Technology Act, 2000; that require publishing of the Privacy Policy for collection, use, storage and transfer of sensitive personal data or information.

Please read this Privacy Policy carefully by using the Website, you indicate that you understand, agree and consent to this Privacy Policy. If you do not agree with the terms of this Privacy Policy, please do not use this Website.

By providing us your Information or by making use of the facilities provided by the Website, You hereby consent to the collection, storage, processing and transfer of any or all of Your Personal Information and Non-Personal Information by us as specified under this Privacy Policy. You further agree that such collection, use, storage and transfer of Your Information shall not cause any loss or wrongful gain to you or any other person.

2. Information Management Practices

2.1 Purpose-Driven Data Usage

  • Information is gathered strictly to support requested services, operational efficiency, and essential business functions.

  • Data handling activities align with lawful standards and focus on protecting user interests.

  • Processing activities are carried out with openness, ethical handling, and traceable procedures.

  • Users are clearly notified about why their information is collected before it is used.

2.2 Categories of Data We Process

  • We may collect basic identification details, communication information, workplace data, and interaction metrics.

  • Technical information such as IP addresses, device metadata, browser behavior, and cookies may also be recorded.

  • Data gathering is minimized to what is operationally necessary.

  • All processing activities are logged and reviewed as part of our compliance checks.

2.3 Safeguards and Controls

  • We apply layered protection strategies designed to keep information secure from unauthorized access.

  • Storage systems include encryption, access limitations, and monitoring tools for enhanced safety.

  • System activities are recorded to detect irregular patterns or misuse.

  • Regular technical assessments and internal reviews ensure ongoing system security.

  • Team members handling sensitive data receive security-focused training.

2.4 Data Storage Duration

  • Information is retained only for periods necessary to fulfill the purpose for which it was collected.

  • Once retention ends, data is erased, anonymized, or securely removed from all systems.

  • Archived materials undergo periodic reviews to remove obsolete content.

  • Backup files follow strict encrypted disposal procedures.

3. User Privacy Commitments

3.1 Confidential Treatment of Information

  • All submitted information is handled as confidential and protected from unauthorized release.

  • Access to personal data is limited to staff members with verified operational needs.

  • Data accuracy and integrity are regularly validated.

3.2 Built-In Privacy Measures

  • Privacy considerations are embedded into platform design and development processes.

  • Security measures such as encryption and minimal data usage are automatically applied.

  • Features interacting with personal information undergo review prior to deployment.

3.3 User Rights and Control

  • Users can request updates, corrections, or removal of their information.

  • We provide clear insights into what data is collected and how it is utilized.

  • Cookie preferences and tracking permissions can be adjusted through browser or site settings.

3.4 Obligations of Employees and Partners

  • Individuals with system access must uphold confidentiality agreements and data practices.

  • Third-party vendors must adhere to strict privacy requirements that match our own.

  • Regular training sessions help uphold proper data protection behavior.

4. Incident Response and Security Events

4.1 Ongoing System Surveillance

  • Monitoring systems operate continuously to identify unusual patterns or potential threats.

  • Automated tools help detect vulnerabilities or unauthorized behavior early.

4.2 Containment and Resolution

  • When an incident is identified, containment measures are activated immediately.

  • Specialized teams investigate to determine the impact and required remediation steps.

4.3 User Notifications During Incidents

  • Users are informed promptly if an event may compromise their data.

  • Communications include descriptive summaries and recommended protective actions.

4.4 Post-Event Strengthening

  • Each event undergoes a full review to identify improvements.

  • System updates and additional safeguards are implemented as corrective measures.

  • Regular simulation exercises ensure preparedness for future incidents.

5. Ownership of Content and Materials

5.1 Company Intellectual Assets

  • All website content, including graphics, software, layouts, and written materials, belongs exclusively to the Company.

  • Redistribution or reproduction requires official authorization.

5.2 Approved Usage

  • Users may view or print content for personal, non-commercial reference.

  • Materials may not be altered or used in misleading ways.

5.3 Restricted Activity

  • Commercial use or resale of platform content is prohibited.

  • Brand elements may not be used without written approval.

  • Unauthorized activities may result in suspension or legal action.

5.4 User Feedback and Contributions

  • Any input, suggestions, or feedback provided may be used to enhance services.

  • Submitted content must comply with legal and intellectual property standards.

6. Use of External Tools and Providers

6.1 Third-Party Components

  • The platform may incorporate tools or integrations provided by other service providers.

  • These third parties maintain independent privacy and usage terms.

6.2 Limitations in Oversight

  • We do not govern or influence third-party service behavior or security practices.

  • Links or integrations do not imply endorsement or verification.

6.3 Sharing Information With Vendors

  • Data may be shared only when necessary for functionality or service fulfillment.

  • All partners must protect shared information in accordance with required standards.

6.4 User Choices

  • Engagement with external providers is a voluntary action taken by the user.

  • We are not liable for any outcomes resulting from interactions with third-party systems.

7. Liability, User Responsibilities, and Policy Changes

7.1 Service Limitations and Warranty

  • The platform is offered with no guarantees regarding availability or uninterrupted performance.

  • We do not assume liability for indirect or incidental damages resulting from service use.

7.2 User Security Requirements

  • Users are responsible for maintaining the confidentiality of their accounts and login information.

  • Any activity performed under a user’s credentials is considered their responsibility.

7.3 Protection Against Claims

  • Users agree to defend and indemnify the Company against claims resulting from misuse or policy violations.

7.4 Handling Concerns and Disputes

  • Issues should first be brought to our support team for resolution.

  • If not resolved, disputes may proceed to mediation or arbitration as applicable.

  • Final decisions from arbitration are binding.

7.5 Updates to This Privacy Policy

  • This policy may be updated to reflect operational, legal, or technological changes.

  • Use of the platform after updates indicates acceptance of revised terms.

8. Contact Information

You may reach us for any questions regarding how your data is managed:

Feel free to contact us for further details about our privacy and data protection practices.