Privacy Policy

1. Data Usage

check circle

Data Collection: Patdel collects specific user information, including:

  • Email ID & Contact Number: This data is collected for user authentication purposes.
  • Website Cookies: Patdel uses functional cookies to maintain login sessions for up to 12 hours. These cookies only gather anonymized data, such as session identifiers and user preferences. Patdel does not store or transmit personally identifiable information (PII) or sensitive data through cookies.
check circle

Cookie Management: Users can manage their cookie preferences through their web browser settings. Blocking or deleting functional cookies is an option, though it may affect certain features of the website.

    check circle

    Data Security Measures: Patdel strictly avoids the use of third-party cookies and prevents external entities from accessing or placing cookies on our website. This ensures user data remains secure and within Patdel's control.

      check circle

      Third-Party Data Handling: Patdel doesn’t share user data from third parties with external organizations.

        2. User Management - Identity, Authentication, and Access Control

        check circle

        User Authentication

        • a. Access to the Patdel system is limited to authorized administrators.
        • b. Users must provide a unique email ID and password to access our services.
        • c. Administrators have the necessary privileges to manage services.
        check circle

        Data Sharing

        • Patdel does not share your information with advertisers or use it for marketing or advertising purposes. If you decide to stop using our services, we will take the necessary steps to protect your data and ensure your privacy.
        check circle

        Encryption

        • To enhance data security, we use AWS's built-in encryption to protect your data both at rest and in transit. This includes encrypting data across AWS workloads, using digital signatures, integrating encryption into your applications with AWS SDK, and verifying message authentication codes.
        check circle

        Password Security

        • Users are encouraged to create strong, regularly updated passwords. Patdel does not store your passwords; instead, you manage them independently. For secure authorization, we rely on AWS Cognito, a trusted User authentication service.

        3. Data Security

        check circle

        Data Storage

        • Patdel stores data securely within Amazon AWS infrastructure, which provides comprehensive encryption for data at rest and in transit. AWS implements strict access controls based on the principle of least privilege, ensuring that only authorized personnel have access to data.
        check circle

        Incident Handling

        • If an incident occurs, users can report it via Patdel's dedicated service desk email. Our response team will thoroughly investigate and analyze the issue, promptly taking corrective measures to minimize any potential impact.

        4. Network Security

        check circle

        Hosting on AWS Virtual Private Cloud (VPC)

        • Patdel's applications and services are hosted within a Virtual Private Cloud (VPC) on Amazon Web Services (AWS). This architecture ensures that sensitive components are isolated in private subnets, preventing direct access from the public internet.
        check circle

        Encryption of Data in Transit

        • All data exchanged between clients, application servers, and databases is encrypted using SSL/TLS protocols. This encryption ensures secure communication, protecting our application from potential threats during transmission.
        check circle

        SSL Certificate Management

        • SSL certificates are managed through AWS Private Certificate Authority. Automatic certificate renewals are set up to ensure continuous and seamless security for users, maintaining encrypted communications at all times.
        check circle

        AWS Security Groups

        • Patdel uses AWS Security Groups to control inbound and outbound traffic to its resources. These act as virtual firewalls, allowing only authorized traffic to access the application and databases, enhancing the security of the environment.
        check circle

        AWS Identity and Access Management (IAM)

        • Strict access control is enforced using AWS IAM. Only authorized personnel and services have access to the necessary resources, minimizing exposure to sensitive data.
        check circle

        Continuous Monitoring and Logging

        • AWS CloudWatch and AWS CloudTrail are used to continuously monitor network activity and log any events or changes. This enables real-time detection of security threats and ensures auditability for compliance.