hidden

PRIVACY POLICY

Effective Date: 28-01-2026

Last Updated: 28-01-2026

1. Purpose and Scope

Maganti IT Resources Pvt Ltd (“Company,” “we,” “our,” or “us”) is a technology services organization committed to protecting the privacy, confidentiality, and security of personal information entrusted to us.

This Privacy Policy describes how we collect, use, store, disclose, and protect information when individuals:

  • Visit our websites or digital properties
  • Communicate with us
  • Engage our technology or professional services
  • Interact with us in a business, contractual, or government capacity

Our privacy program is designed to align with recognized cybersecurity and information security standards, including controls commonly required for:

  • ISO/IEC 27001
  • SOC 2 Type II
  • Government security and privacy frameworks
  • Applicable data protection and privacy laws

2. Definitions

  • Personal Information: Any information that identifies or can reasonably be linked to an individual.
  • Client Data: Data provided by or on behalf of a client in connection with services.
  • Processing: Any operation performed on information, including collection, storage, use, disclosure, or deletion.
  • Authorized Personnel: Employees or contractors granted access based on role and necessity.

3. Information We Collect

3.1 Information Provided Directly

We may collect personal information that individuals voluntarily provide, including:

  • Personal Information: Any information that identifies or can reasonably be linked to an individual.
  • Client Data: Data provided by or on behalf of a client in connection with services.
  • Processing: Any operation performed on information, including collection, storage, use, disclosure, or deletion.
  • Authorized Personnel: Employees or contractors granted access based on role and necessity.

Providing information is voluntary; however, certain services may require specific information to proceed.

3.2 Information Collected Automatically

When users access our websites or digital services, we may automatically collect:

  • IP address
  • Browser type and version
  • Device type and operating system
  • Pages visited, time spent, and referring URLs
  • Date and time of access

This information is used for security monitoring, performance analysis, and service improvement.

3.3 Client and End-User Data

In the course of providing services, we may process Client Data that contains personal or sensitive information. Such data:

  • Is processed solely under documented client instructions
  • Remains the property and responsibility of the client
  • Is protected using contractual, technical, and organizational safeguards

We do not use Client Data for our own purposes.

4. Legal Basis for Processing

We process information only when there is a lawful and legitimate basis, including:

  • Personal Information: Any information that identifies or can reasonably be linked to an individual.
  • Client Data: Data provided by or on behalf of a client in connection with services.
  • Processing: Any operation performed on information, including collection, storage, use, disclosure, or deletion.
  • Authorized Personnel: Employees or contractors granted access based on role and necessity.

5. How We Use Information

We use information to:

  • Deliver and support technology and professional services
  • Respond to inquiries and manage relationships
  • Perform contractual obligations
  • Maintain security, integrity, and availability of systems
  • Detect, prevent, and respond to security incidents
  • Conduct audits, risk assessments, and compliance activities
  • Improve services, processes, and user experience

We do not sell personal information.

6. Information Security and Cybersecurity Controls

We maintain a formal information security management program aligned with cybersecurity certification standards and government expectations.

6.1 Administrative Safeguards

  • Documented information security and privacy policies
  • Risk assessment and risk treatment processes
  • Employee background checks where legally permitted
  • Mandatory security and privacy training
  • Incident response and breach notification plans

6.2 Technical Safeguards

  • Secure software development lifecycle (SDLC)
  • Role-based access controls and least-privilege enforcement
  • Multi-factor authentication where appropriate
  • Encryption of data in transit and at rest (as applicable)
  • Continuous monitoring, logging, and alerting
  • Regular vulnerability scanning and remediation

6.3 Physical Safeguards

  • Secure facilities and controlled access
  • Asset management and secure disposal practices
  • Environmental and operational protections

7. Data Sharing and Disclosure

Information may be disclosed only:

  • To authorized personnel with a legitimate business need
  • To vetted third-party service providers under written agreements
  • To comply with applicable laws, regulations, or legal processes
  • To protect the rights, safety, or security of individuals or systems

All third parties are required to meet security and confidentiality obligations consistent with this policy.

8. Third-Party Service Providers

We engage third-party vendors for services such as:

  • Hosting and infrastructure
  • Analytics and monitoring
  • Communication and support tools

Vendor risk is managed through:

  • Due diligence and security assessments
  • Contractual confidentiality and data protection clauses
  • Ongoing oversight where appropriate

9. Data Retention and Disposal

We retain information only for as long as necessary to:

  • Fulfill service and contractual requirements
  • Meet legal, regulatory, and audit obligations
  • Resolve disputes and enforce agreements

Data is securely disposed of using documented deletion and destruction methods when retention is no longer required.

10. Privacy Rights

Subject to applicable laws, individuals may have the right to:

  • Access personal information
  • Request correction or deletion
  • Restrict or object to processing
  • Receive information about data handling practices

Requests will be verified and addressed within legally required timeframes.

11. Cookies and Similar Technologies

We use cookies and similar technologies to:

  • Enable essential website functionality
  • Analyze usage and improve performance
  • Support security and fraud prevention

Users may control cookie settings through their browser preferences.

12. International Data Transfers

Where information is transferred across borders, we implement appropriate safeguards to ensure protection consistent with this Privacy Policy and applicable legal requirements.

13. Incident Response and Breach Notification

We maintain documented incident response procedures to:

  • Identify and contain security incidents
  • Investigate and remediate impacts
  • Notify affected parties and authorities when required by law

14. Children’s Privacy

Our services are not directed to children, and we do not knowingly collect personal information from individuals under the age required by applicable law.

15. Policy Updates

This Privacy Policy may be updated periodically to reflect:

  • Changes in legal or regulatory requirements
  • Enhancements to security practices
  • Operational or service changes

Revisions will be posted with an updated effective date.

16. Contact Information

For privacy-related questions, concerns, or requests, contact:

Privacy Officer / Data Protection Contact
Maganti IT Resources Pvt Ltd
hr@mitresource.com