What is your Key focus areas? *
AI Workflow and Operations
Data Management and Operations
AI Governance
Analytics and Insights
Observability
Security Operations
Risk and Compliance
Procurement and Supply Chain
Private Cloud AI
Vision AI
Get Started with your requirements and primary focus, that will help us to make your solution
Our website address is: https://www.xenonstack.com
The terms We / Us / Our / Company individually and collectively refer to XenonStack Pvt. Ltd., and the terms You / Your / Yourself refer to the users of this website and its services.
These Terms and Conditions are an electronic record in the form of an electronic contract formed under the Information Technology Act, 2000 and the rules made thereunder, including the amended provisions pertaining to electronic documents/records under various statutes as amended by the Information Technology Act, 2000. These Terms do not require any physical, electronic, or digital signature.
This document is published and shall be construed in accordance with the provisions of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 under the Information Technology Act, 2000, which require publishing of terms and conditions governing the collection, use, storage, and transfer of information.
Please read these Terms and Conditions carefully. By using the Website, you indicate that you understand, agree, and consent to these Terms. If you do not agree with any part of these Terms and Conditions, please do not use this Website.
By using the Website or its services, you consent to comply with these Terms and Conditions and agree that your use shall not cause loss or wrongful gain to you or any other person. You further agree to act lawfully and in accordance with all applicable rules and regulations while using the Website.
Personal and business data is collected only for clear, legitimate, and specific purposes.
Data is used solely to deliver services, manage customer relationships, and improve user experience.
Processing is performed with fairness, integrity, and transparency at every stage.
Users are informed about the purpose of data collection before any information is stored or processed.
Information collected may include names, contact details, organization information, and system usage metrics.
Additional data such as browser type, device information, and cookies may be collected to enhance website performance and security.
Only the minimum amount of information required to perform a task is collected.
All data handling activities are recorded and periodically reviewed to ensure accountability.
Multiple layers of security protect information from loss, misuse, or unauthorized access.
Data is stored in secure environments with encryption, access restrictions, and continuous monitoring.
System activity is logged to identify unusual or unauthorized behavior.
Regular penetration testing, vulnerability assessments, and internal audits are conducted.
Employees handling data receive training on security and confidentiality practices.
Personal data is retained only as long as required for the original purpose of collection.
Once retention periods expire, data is securely deleted or anonymized.
Archived information is periodically reviewed and unnecessary records are removed.
Backup data is encrypted and destroyed using secure disposal procedures.
All information provided is treated as confidential and protected from unauthorized disclosure.
Access to personal or confidential data is restricted to authorized personnel.
System integrity and data accuracy are continuously monitored.
Privacy considerations are integrated into all website features and operations.
Data minimization, encryption, and secure access measures are built into every process.
Features involving personal data undergo privacy and security review before activation.
Users may review, update, or request deletion of their personal information.
Clear information is provided about what data is collected and how it is used.
Cookie and tracking preferences can be adjusted through browser or site settings.
Staff and contractors with access to sensitive data are bound by confidentiality agreements.
Partners and service providers must comply with equivalent privacy and security obligations.
Regular training programs maintain high privacy standards.
Systems are monitored continuously to detect anomalies or unauthorized access.
Automated alerts and detection tools help identify potential breaches early.
Immediate actions are taken to isolate affected systems in case of a breach.
A response team investigates and assesses the impact.
Affected users are notified promptly if a breach poses a risk.
Clear communication ensures understanding of the event and remediation steps.
Each incident undergoes root-cause analysis to determine preventive actions.
Lessons learned are incorporated into the security system.
Periodic simulations and drills ensure readiness.
All website content, including designs, text, software, graphics, and logos, is owned by the Company.
No content may be copied, republished, modified, or distributed without written approval.
Users may view, download, or print content for personal or non-commercial use.
Content may not be altered, misrepresented, or used misleadingly.
Reproduction or resale of website content or digital products is prohibited.
Use of trademarks or branding requires explicit authorization.
Unauthorized use may result in access suspension or legal action.
Submitted materials may be used by the Company without obligation or compensation.
Content must not infringe on rights or contain unlawful material.
The website may include links, APIs, or components from third-party services.
These platforms operate under their own terms and privacy policies.
We do not control or guarantee the accuracy or security of external sites.
Links do not imply endorsement.
Limited data may be shared with trusted partners only when necessary.
Partners must maintain confidentiality and secure practices.
Interaction with third-party services is at the user’s discretion.
We are not liable for damages arising from third-party use.
Services are provided “as is” and “as available” without warranties.
We are not responsible for indirect or consequential losses.
Users must secure their accounts, credentials, and devices.
Activities under a user’s credentials are their responsibility.
Users agree to indemnify the Company against claims arising from misuse or breaches.
Disputes are first addressed through mutual discussion.
Unresolved matters proceed to arbitration or mediation.
Arbitration decisions are final and binding.
Terms may be modified or updated at any time.
Continued use indicates acceptance of revised terms.
If you have any concerns regarding your privacy or how your personal information is handled, you may contact us using the details below:
Website: https://www.xenonstack.com
We encourage you to contact us if you require further information about our data handling practices.