xenonstack-logo

Interested in Solving your Challenges with XenonStack Team

Get Started

Get Started with your requirements and primary focus, that will help us to make your solution

Please Select your Industry
Banking
Fintech
Payment Providers
Wealth Management
Discrete Manufacturing
Semiconductor
Machinery Manufacturing / Automation
Appliances / Electrical / Electronics
Elevator Manufacturing
Defense & Space Manufacturing
Computers & Electronics / Industrial Machinery
Motor Vehicle Manufacturing
Food and Beverages
Distillery & Wines
Beverages
Shipping
Logistics
Mobility (EV / Public Transport)
Energy & Utilities
Hospitality
Digital Gaming Platforms
SportsTech with AI
Public Safety - Explosives
Public Safety - Firefighting
Public Safety - Surveillance
Public Safety - Others
Media Platforms
City Operations
Airlines & Aviation
Defense Warfare & Drones
Robotics Engineering
Drones Manufacturing
AI Labs for Colleges
AI MSP / Quantum / AGI Institutes
Retail Apparel and Fashion

Proceed Next

banner-background-image

Terms and Conditions

1. Who we are

Our website address is: https://www.xenonstack.com

The terms We / Us / Our / Company individually and collectively refer to XenonStack Pvt. Ltd., and the terms You / Your / Yourself refer to the users of this website and its services.

These Terms and Conditions are an electronic record in the form of an electronic contract formed under the Information Technology Act, 2000 and the rules made thereunder, including the amended provisions pertaining to electronic documents/records under various statutes as amended by the Information Technology Act, 2000. These Terms do not require any physical, electronic, or digital signature.

This document is published and shall be construed in accordance with the provisions of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 under the Information Technology Act, 2000, which require publishing of terms and conditions governing the collection, use, storage, and transfer of information.

Please read these Terms and Conditions carefully. By using the Website, you indicate that you understand, agree, and consent to these Terms. If you do not agree with any part of these Terms and Conditions, please do not use this Website.

By using the Website or its services, you consent to comply with these Terms and Conditions and agree that your use shall not cause loss or wrongful gain to you or any other person. You further agree to act lawfully and in accordance with all applicable rules and regulations while using the Website.

2. Data Protection

2.1 Lawful and Fair Use of Data

  • Personal and business data is collected only for clear, legitimate, and specific purposes.

  • Data is used solely to deliver services, manage customer relationships, and improve user experience.

  • Processing is performed with fairness, integrity, and transparency at every stage.

  • Users are informed about the purpose of data collection before any information is stored or processed.

2.2 Data Collection and Handling

  • Information collected may include names, contact details, organization information, and system usage metrics.

  • Additional data such as browser type, device information, and cookies may be collected to enhance website performance and security.

  • Only the minimum amount of information required to perform a task is collected.

  • All data handling activities are recorded and periodically reviewed to ensure accountability.

2.3 Data Security Controls

  • Multiple layers of security protect information from loss, misuse, or unauthorized access.

  • Data is stored in secure environments with encryption, access restrictions, and continuous monitoring.

  • System activity is logged to identify unusual or unauthorized behavior.

  • Regular penetration testing, vulnerability assessments, and internal audits are conducted.

  • Employees handling data receive training on security and confidentiality practices.

2.4 Data Retention and Deletion

  • Personal data is retained only as long as required for the original purpose of collection.

  • Once retention periods expire, data is securely deleted or anonymized.

  • Archived information is periodically reviewed and unnecessary records are removed.

  • Backup data is encrypted and destroyed using secure disposal procedures.

3. Data Privacy

3.1 Confidentiality and Integrity

  • All information provided is treated as confidential and protected from unauthorized disclosure.

  • Access to personal or confidential data is restricted to authorized personnel.

  • System integrity and data accuracy are continuously monitored.

3.2 Privacy by Design

  • Privacy considerations are integrated into all website features and operations.

  • Data minimization, encryption, and secure access measures are built into every process.

  • Features involving personal data undergo privacy and security review before activation.

3.3 User Control and Transparency

  • Users may review, update, or request deletion of their personal information.

  • Clear information is provided about what data is collected and how it is used.

  • Cookie and tracking preferences can be adjusted through browser or site settings.

3.4 Employee and Partner Responsibility

  • Staff and contractors with access to sensitive data are bound by confidentiality agreements.

  • Partners and service providers must comply with equivalent privacy and security obligations.

  • Regular training programs maintain high privacy standards.

4. Data Breach Management

4.1 Continuous Monitoring

  • Systems are monitored continuously to detect anomalies or unauthorized access.

  • Automated alerts and detection tools help identify potential breaches early.

4.2 Response and Containment

  • Immediate actions are taken to isolate affected systems in case of a breach.

  • A response team investigates and assesses the impact.

4.3 Notification and Communication

  • Affected users are notified promptly if a breach poses a risk.

  • Clear communication ensures understanding of the event and remediation steps.

4.4 Post-Incident Review

  • Each incident undergoes root-cause analysis to determine preventive actions.

  • Lessons learned are incorporated into the security system.

  • Periodic simulations and drills ensure readiness.

5. Intellectual Property and Content Use

5.1 Ownership

  • All website content, including designs, text, software, graphics, and logos, is owned by the Company.

  • No content may be copied, republished, modified, or distributed without written approval.

5.2 Permitted Use

  • Users may view, download, or print content for personal or non-commercial use.

  • Content may not be altered, misrepresented, or used misleadingly.

5.3 Restrictions

  • Reproduction or resale of website content or digital products is prohibited.

  • Use of trademarks or branding requires explicit authorization.

  • Unauthorized use may result in access suspension or legal action.

5.4 User-Submitted Content

  • Submitted materials may be used by the Company without obligation or compensation.

  • Content must not infringe on rights or contain unlawful material.

6. Third-Party Integrations

6.1 Linked Services

  • The website may include links, APIs, or components from third-party services.

  • These platforms operate under their own terms and privacy policies.

6.2 Responsibility and Control

  • We do not control or guarantee the accuracy or security of external sites.

  • Links do not imply endorsement.

6.3 Data Sharing with Third Parties

  • Limited data may be shared with trusted partners only when necessary.

  • Partners must maintain confidentiality and secure practices.

6.4 User Discretion

  • Interaction with third-party services is at the user’s discretion.

  • We are not liable for damages arising from third-party use.

7. Liability and Dispute Resolution

7.1 Limitation of Liability

  • Services are provided “as is” and “as available” without warranties.

  • We are not responsible for indirect or consequential losses.

7.2 User Responsibilities

  • Users must secure their accounts, credentials, and devices.

  • Activities under a user’s credentials are their responsibility.

7.3 Indemnification

  • Users agree to indemnify the Company against claims arising from misuse or breaches.

7.4 Dispute Resolution

  • Disputes are first addressed through mutual discussion.

  • Unresolved matters proceed to arbitration or mediation.

  • Arbitration decisions are final and binding.

7.5 Modification of Terms

  • Terms may be modified or updated at any time.

  • Continued use indicates acceptance of revised terms.

8. Contact Information

If you have any concerns regarding your privacy or how your personal information is handled, you may contact us using the details below:

We encourage you to contact us if you require further information about our data handling practices.

×

From Fragmented PoCs to Production-Ready AI

From AI curiosity to measurable impact - discover, design and deploy agentic systems across your enterprise.

modal-card-icon-three

Building Organizational Readiness

Cognitive intelligence, physical interaction, and autonomous behavior in real-world environments

modal-card-icon-two

Business Case Discovery - PoC & Pilot

Validate AI opportunities, test pilots, and measure impact before scaling

modal-card-icon

Responsible AI Enablement Program

Govern AI responsibly with ethics, transparency, and compliance

Get Started Now

Neural AI help enterprises shift from AI interest to AI impact — through strategic discovery, human-centered design, and real-world orchestration of agentic systems