Privacy Policy

Overview

This Privacy Policy applies to all products, services, and websites
offered by Nidam Integrated. In cases where more detailed information is needed
to explain our privacy practices, we post supplementary privacy notices to
describe how specific services process personal information. Information We
Collect and How We Use It We understand that during the course of delivering our
numerous products and services to you via the internet, we will come across
certain personal information. This information is handled with care and used as
follows: Information You Provide When you sign up for any Nidam Integrated
service or promotion that requires registration, we ask for personal information
such as your name, email address, and account password. Typically, we do not
store this information, but when we do, we maintain it in encrypted form on
secure servers. We may combine the information you submit under your account
with information from other third parties to provide a better experience and
improve our services. For certain services, we may give you the opportunity to
opt out of combining such information. Log Information When you access Nidam
Integrated, our servers automatically record information that your browser sends
whenever you visit a website. User Communications When you send email or other
communications to Nidam Integrated, we may retain those communications to
process your inquiries, respond to your requests, and improve our services.
Other Sites This Privacy Policy applies only to Nidam Integrated. We do not
control the sites displayed or linked from within our various services. These
other sites may place their own cookies or other files on your computer, collect
data, or solicit personal information from you. Data Policy Nidam Integrated’
Data Protection Policy demonstrates our commitment to treating information of
employees, customers, stakeholders, and other interested parties with the utmost
care and confidentiality. With this policy, we ensure that we gather, store, and
handle data fairly, transparently, and with respect for individual rights. Scope
This policy applies to all parties (employees, customers, suppliers, merchants,
etc.) who provide any amount of information to us. Employees of our company and
its subsidiaries, as well as contractors, consultants, partners, and any other
external entities, must follow this policy. Generally, our policy applies to
anyone we collaborate with or who acts on our behalf and may need occasional
access to data. Policy Elements As part of our operations, we need to obtain and
process information. This information includes any offline or online data that
makes a person identifiable, such as names, addresses, usernames and passwords,
digital footprints, photographs, social security numbers, financial data, etc.
Our company collects this information transparently and only with the full
cooperation and knowledge of interested parties. Once this information is
available to us, the following rules apply: Our data will be accurate and kept
up-to-date. Collected fairly and for lawful purposes only. Processed by the
company within its legal and moral boundaries. Our data will not be:
Communicated informally. Stored for more than a specified amount of time.
Transferred to organizations, states, or countries that do not have adequate
data protection policies. Distributed to any party other than the ones agreed
upon by the data’s owner (excepting legitimate requests from law enforcement
authorities). In addition to the ways of handling data, the company has direct
obligations towards the people to whom the data belongs. Specifically, we must:
Let people know which of their data is collected. Inform people about how we’ll
process their data. Inform people about who has access to their information.
Have provisions in cases of lost, corrupted, or compromised data. Allow people
to request that we modify, erase, reduce, or correct data contained in our
databases. To exercise data protection, we’re committed to: Restricting and
monitoring access to sensitive data. Establishing data protection practices
(document shredding, secure locks, data encryption, frequent backups, access
authorization, etc.).

Scroll to Top