Security

We use hi-tech security measures for maintaining accuracy, protecting customer data from unauthorized access, and ensuring appropriate use of the data. As modern web browsers are also used for accessing the service, robust transport layer security technology is used for protecting the customer data through data encryption and server authentication. The technology is capable enough to keep the data safe and secure. The information is available only to the customer who owns it.

The App has implemented an advanced security method to prevent interference and unauthenticated access. The security method is based upon encoded session identifications which uses security systems and advanced security technology.

Improved security features are available for the customers for configuration of security settings to a higher level. However, the user can also recognize that no method of transmission over the teof eectonic method stormethod method age is perfectly secure, and we cannot guarantee 100% security of your information. In addition, because internet communications are ununsecured it is also possible that the information you supply to us or your access oofany information via the app will be intercepted during transmission.

We are not liable for any breach of our systems or interception of our transmission, and we at this moment fully deny, to the fullest extent possible under law, any liability associated with any claim relating to a breach of security, data, or information. 

Compliance with Laws 

We reserve the right to disclose any information to comply with any law, regulation, decree, judgment, order, or any other governmental order without any obligation to contest or verify the accuracy of such Order. 

Miscellaneous 

The section headings in this Policy are for comfort only and have no lawful or contractual effect. Some of the services may be subject to further terms and conditions concerning privacy and the use of information. We ensure the maintenance of security and confidentiality of the information during its processing. The information is required to be accessed, used, disclosed, or preserved for the following reasons – 

  • For satisfaction of any regulation, law, or legal procedure 
  • For enforcing the applicable terms of services 
  • For investigation of violation of rules 
  • For prevention of fraudulent activities 
  • To avoid technical issues 
  • For protection against threats to the rights and safety 

If we require revealing personal information in case, we need to be involved in selling some or all the assets, a notice is sent to the user before transferring the public information. In such cases, the information is subjected to a different privacy policy further. 

Contact Us: 

If you have any questions about this Privacy Policy, please get in touch with us: info@peritossolutions.com  

Get In Touch If You Have A Business Query

Related Posts

Release Notes

The blog post will be consistently imparting you with the latest updates on the release of our products and their specific features in order to provide you with the best services.

Read More »