Privacy Policies
INTRODUCTION
OAD TECHNOLOGIES offers a comprehensive suite of cybersecurity solutions designed to protect businesses from the ever-evolving landscape of digital threats. Our expertise spans crucial areas such as malware prevention, phishing attack mitigation, and broader cyber defense strategies. Our services encompasses all facets of computing: hardware (physical components like CPUs, memory, storage, and peripherals), software (operating systems, applications, programming code), and any other tangible or intangible equipment, applications or code.
OAD TECHNOLOGIES is committed to protecting the privacy and security of your personal information. This Privacy Policy describes how we collect, use, disclose, and protect the information we obtain from individuals who visit our websites, use our cybersecurity services, interact with us, or otherwise provide us with information.
As a cybersecurity services provider, we understand the critical importance of data privacy and security. We are dedicated to maintaining the trust you place in us by handling your information responsibly and in compliance with applicable data protection laws.
INFORMATION WE COLLECT
We may collect various types of information, depending on your interactions with us and the services you utilize:
- Information You Provide Directly:
Contact Information: Name, email address, phone number, company name, job title, postal address.
Account Information: Usernames, passwords (hashed), and other credentials for accessing services.
Payment Information : Billing address, credit card details (processed securely by third-party payment processors).
Communications : Information you provide when you contact us with inquiries, support requests, feedback, or participate in surveys.
Service-Specific Information: Data you provide or that is generated in the course of us providing cybersecurity services to you (e.g., security incident details, vulnerability data, system logs – this will be highly specific to your services).
- Information We Collect Automatically:
Website Usage Data: IP address, browser type, operating system, referring URLs, pages viewed, time spent on pages, clickstream data.
Cookies and Tracking Technologies: Information collected through cookies, web beacons, and similar technologies to enhance your Browse experience, analyze website usage, and for marketing purposes.
Service Performance Data: Data related to the performance and usage of our cybersecurity services, which may include anonymized or aggregated security data.
- Information from Third Parties:
We may receive information from third-party partners, service providers, or publicly available sources, consistent with applicable laws, to supplement the information we collect directly.
HOW WE USE YOUR INFORMATION
We use the information we collect for the following purposes:
- To Provide and Maintain Our Services:
- Delivering, operating, and improving our cybersecurity services.
- Processing your transactions and managing your accounts.
- Providing technical support and customer service.
- Monitoring and analyzing the performance and effectiveness of our services.
- Detecting, preventing, and addressing technical issues and security incidents.
- To Communicate with You:
- Responding to your inquiries and fulfilling your requests.
- Sending you administrative information, such as service updates, security alerts, and policy changes.
- Providing you with marketing and promotional communications about our services, events, and relevant industry news (you can opt-out of these).
- For Internal Operations and Analytics:
- Understanding how users interact with our website and services to improve their functionality and user experience.
- Conducting research and analysis to develop new products and features.
- For internal record-keeping, auditing, and reporting.
- For Security and Fraud Prevention:
- Protecting our systems, services, and users from fraud, security threats, and unauthorized access.
- Investigating and responding to security incidents.
- Enforcing our terms of service and other policies.
- To Comply with Legal Obligations:
- Meeting legal, regulatory, and compliance requirements.
- Responding to lawful requests from public authorities, including to meet national security or law enforcement requirements.
HOW WE SHARE AND DISCLOSE YOUR INFORMATION
We may share and disclose your information in the following circumstances:
- With Service Providers: We engage trusted third-party service providers to perform functions on our ,behalf, such as hosting, data analysis, payment processing, marketing, and customer support. These providers are obligated to protect your information and only use it for the purposes for which we disclose it to them.
- With Affiliates: We may share information with our corporate affiliates for purposes consistent with this Privacy Policy.
- For Legal Reasons: We may disclose your information if required to do so by law or in the good faith, belief that such action is necessary to:
- Comply with a legal obligation or valid legal process.
- Protect and defend the rights or property of OAD Technologies.
- Prevent or investigate possible wrongdoing in connection with the services.
- Protect the personal safety of users of the services or the public.
- Protect against legal liability.
- Business Transfers: In the event of a merger, acquisition, reorganization, sale of assets, or bankruptcy, your information may be transferred as part of that transaction. In the dynamic business world, companies sometimes undergo significant changes, such as mergers, acquisitions, reorganizations, the sale of assets, or even bankruptcy. We want to be transparent about how your personal information might be handled in such scenarios. It's important for you to understand that, in these situations, your information may be transferred as part of that transaction.
This means if our company is acquired by another entity, merges with another business, or sells off a substantial portion of its assets, the data we hold, including your personal information, would typically be considered among the assets being transferred. This transfer is generally necessary to allow the new or restructured entity to continue operating the business and providing services effectively. For instance, if another cybersecurity company acquires us, they’d need access to customer accounts and service history to ensure a seamless continuation of the security services you rely on.
We recognize that a change in ownership or control of your personal information is a significant event. Therefore, we commit to providing you with clear and timely notification should such a transfer occur. Our primary method of communication will be via email, sent to the address associated with your account. Additionally, we will post a prominent notice on our website. This notice will be easy to find and will clearly explain the change in ownership or control of your personal information, providing you with relevant details about the new entity and any impact on your data privacy. Our aim is to ensure you are well-informed and have the opportunity to understand the implications of such a business transition.
- With Your Explicit Consent or at Your Direction: Your personal information is yours, and we respect your control over it. There will be situations where we might need or want to share your information, but we won't do so without your clear permission. This means that if we identify a specific reason to share your data with a third party that isn't already covered in this privacy policy (for instance, to integrate with a new service you've specifically requested, or to participate in a joint marketing effort with a partner where you'd receive a benefit), we will first ask for your explicit consent. We may share your information with your explicit consent or at your direction.
- Understanding Aggregated and Anonymized Data and its sharing: When we refer to "aggregated or de-identified information," we're talking about data that has been transformed in a way that cannot reasonably be used to identify you as an individual. This means your personal information is no longer linked directly to you. It's a crucial distinction from personal data, which is directly attributable to you.
DATA SECURITY
We implement robust technical and organizational security measures designed to protect your personal information from unauthorized access, use, alteration, and disclosure. These measures include:
- Encryption: Using encryption for data in transit and at rest where appropriate.
- Access Controls: Implementing strict access controls and authentication mechanisms.
- Regular Security Audits: Conducting regular security assessments and penetration testing.
- Employee Training: Training our employees on data privacy and security best practices.
- Incident Response Plan: Maintaining a comprehensive incident response plan to address potential security breaches.
While we strive to protect your personal information, no method of transmission over the internet or method of electronic storage is 100% secure. Therefore, we cannot guarantee its absolute security.
DATA RETENTION
At OAD Technologies, we understand that how long we hold onto your personal information is just as important as how we protect it. We don’t keep your data indefinitely. Instead, we adhere to a strict data retention policy that dictates how long we store your personal information. Essentially, we retain your data only for as long as necessary to fulfill the specific purposes for which it was collected. This commitment ensures that your information isn’t held beyond its useful life, minimizing risk and upholding your privacy.
This principle is guided by several key considerations, ensuring we strike a balance between providing our services effectively and respecting your data privacy rights. We meticulously evaluate each type of data to determine its appropriate lifecycle.
YOUR DATA PROTECTION RIGHTS
Depending on your location and applicable data protection laws, you may have the following rights regarding your personal information:
- Right to Access: The right to request copies of your personal data.
- Right to Rectification: The right to request that we correct any information you believe is inaccurate or complete information you believe is incomplete.
- Right to Erasure ("Right to be Forgotten"): The right to request that we erase your personal data under certain conditions.
- Right to Restrict Processing: The right to request that we restrict the processing of your personal data under certain conditions.
- Right to Object to Processing: The right to object to our processing of your personal data under certain conditions.
- Right to Data Portability: The right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions.
- Right to Withdraw Consent: Where we rely on your consent to process your personal information, you have the right to withdraw that consent at any time.
To exercise any of these rights, please contact us using the details provided in the “Contact Us” section below. We will respond to your request in accordance with applicable data protection laws.
INTERNATIONAL DATA TRANSFERS
As a global company, your information may be stored and processed in any country where we have facilities or where we engage service providers. By using our services, you understand that your information may be transferred to countries outside of your country of residence, which may have different data protection laws than your country. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and applicable laws.
CHILDREN'S PRIVACY
Our services are not directed to individuals under the age of 16. We do not knowingly collect personal information from children without parental consent. If you believe we have collected personal information from a child without proper consent, please contact us immediately, and we will take steps to remove that information and terminate the child’s account.
CHANGES TO THIS PRIVACY POLICY
We may update this Privacy Policy from time to time to reflect changes in our practices or for other operational, legal, or regulatory reasons. We will notify you of any material changes by posting the new Privacy Policy on this page and updating the “Effective Date” at the top. We encourage you to review this Privacy Policy periodically for any changes.
DISPUTE RESOLUTION
- Governing Law and Jurisdiction: This Policy shall be governed by and construed in accordance with the laws of the Emirate of Dubai, United Arab Emirates.
- Arbitration: Any dispute, controversy, or claim arising out of or relating to this Agreement, including the breach, termination, or validity thereof, shall be referred to and finally resolved by arbitration in accordance with the Arbitration Rules of the Dubai International Financial Centre (DIFC) - London Court of International Arbitration (LCIA) Arbitration Centre, as amended from time to time
- Arbitrator: The tribunal shall consist of a single arbitrator.
- Language: The language of the arbitration shall be English.
- Place of Arbitration: The seat of the arbitration shall be Dubai, United Arab Emirates.
CONTACT US
- OAD SOFTWARE SERVICES FZCO
- License Number 61478
- Dubai Silicon Oasis Free Zone, United Arab Emirates,
- Email Address: info@oadtechnologies.com.
- Phone Number:
Important Note
Protecting your personal information is at the core of what we do. We understand the trust you place in us when you share your data, and we’re committed to safeguarding it with the highest level of care. However, it’s essential to address a fundamental truth of the digital world: methods of transmission over the internet or electronic storage can be prone to security breach from unknown sources. This isn’t a unique challenge for us; it’s a universal reality faced by every entity operating online. The ever-evolving landscape of cyber threats means that even the most robust defenses are in a constant state of adaptation against sophisticated and persistent adversaries. Because of this inherent dynamic, we cannot offer an absolute, unbreakable guarantee of security. At OAD Technologies, we want to build an unshakeable foundation of trust with you. It’s crucial for us that you feel completely confident in how we handle your information. Therefore, we want to assure you with the utmost conviction: OAD Technologies shall defend your information as if it were our very own.