Effective Date: [Insert Date]
Last Updated: 25/01/2025
Version: 1.0
Welcome to Sparkline Technosys Pvt. Ltd. (STPL). Your privacy is important to us. This Privacy Policy explains how we collect, use, store, and protect your data when you use our internet and IT infrastructure services.
By using our services, you agree to the terms outlined in this policy. If you do not agree, please refrain from using our services.
1. Data We Collect
When you subscribe to our services, we collect and store the following types of information:
1.1 Customer Identification Information
- Full Name
- Company Name (if applicable)
- Address (including City, State, Country, and ZIP Code)
- Latitude & Longitude (for service verification)
- Phone Number & Mobile Number
- Email Address
- Subscriber Type
1.2 Account Information
- Contract ID
- Contract Start and End Date
- Portal Username and Password
- GST Number (for business customers)
- User Group (Service Plan)
1.3 Legal Documentation
To comply with legal and regulatory requirements, we collect:
- Government-Issued ID Proof (Aadhar Card, PAN Card, Voter ID, Driving License, Passport, etc.)
- Address Proof (Utility Bill, Rental Agreement, Bank Statement, etc.)
- Passport Size Photograph
- Digital or Scanned Signature
- CAF Form Upload (Customer Application Form)
1.4 Service Usage Data
- Internet usage patterns (e.g., data consumption, peak usage times)
- Type of services subscribed (e.g., broadband, fiber, leased line, etc.)
1.5 Technical Data
- IP addresses assigned to customers
- Device information (device type, operating system, browser type)
- Connection logs (timestamps, session duration, data transfer statistics)
1.6 Support Interaction Records
- Customer support interactions (call recordings, emails, chat history)
- Service requests and complaints
2. How We Use Your Data
STPL uses customer data solely for the following purposes:
✅ Service Provisioning – To set up, activate, and maintain internet services.
✅ Billing & Payments – To generate invoices, process payments, and send notifications.
✅ Regulatory Compliance – To meet government and telecom regulations.
✅ Security & Fraud Prevention – To detect unauthorized activities and prevent service abuse.
✅ Customer Support – To respond to queries, troubleshoot issues, and improve service quality.
✅ Network Optimization – To analyze network performance and enhance connectivity.
3. How We Protect Your Data
We implement strict security measures to ensure customer data remains confidential and protected from unauthorized access, breaches, or misuse.
3.1 Data Encryption
We employ state-of-the-art encryption protocols to ensure that customer data is secure both in transit and at rest, preventing unauthorized interception or access.
- Data in Transit: All data transmitted over our network is secured using SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption to prevent interception by unauthorized parties. This ensures that sensitive information such as login credentials, payment data, and personal details are protected when being transmitted over the internet.
- Data at Rest: All stored customer data, including personal details, payment records, and service logs, is encrypted using AES-256 (Advanced Encryption Standard – 256-bit encryption). This is one of the strongest encryption standards available and ensures that data cannot be accessed without proper authorization.
- End-to-End Encryption (E2EE): Certain confidential data is protected with end-to-end encryption, meaning only authorized users can access it. 3.2 Access Control & Authentication
To prevent unauthorized access to customer data, we use multi-layered access control mechanisms that ensure only authorized personnel can access sensitive information.
- Role-Based Access Control (RBAC): Employees and system administrators are assigned specific roles, with access permissions limited based on their job responsibilities. No single employee has unrestricted access to all data.
- Multi-Factor Authentication (MFA): All administrative access to sensitive customer data requires multi-factor authentication, combining passwords with an additional verification method (such as one-time passwords or biometric authentication).
- Privileged Access Management (PAM): Highly sensitive data, such as financial records and network configurations, is accessible only to senior personnel under strict security policies.
- Secure Access Logs: Every access attempt, modification, or retrieval of customer data is logged, monitored, and audited to prevent unauthorized access and track security breaches. 3.3 Regular Security Audits & Patching
To ensure continuous protection against cyber threats, we conduct routine security audits and vulnerability assessments across all systems.
- Periodic Security Audits: We perform internal and external security audits to assess vulnerabilities in our systems, ensuring compliance with industry best practices.
- Patch Management: All software and infrastructure components are regularly updated with security patches to protect against known vulnerabilities.
- Firewall Protection: Our next-generation firewalls filter incoming and outgoing traffic to prevent unauthorized access.
- Intrusion Detection & Prevention Systems (IDS/IPS): We actively monitor network traffic using intrusion detection systems (IDS) and intrusion prevention systems (IPS) to identify and block suspicious activity in real-time.
- Third-Party Security Assessments: We partner with independent cybersecurity firms to perform penetration testing and security assessments to identify and address potential vulnerabilities in our infrastructure. 3.4 Data Minimization & Anonymization
We strictly adhere to the principle of data minimization, ensuring that only the necessary amount of customer data is collected and stored for legitimate business purposes.
- Limited Data Collection: We only collect the essential data required for service provisioning, billing, and regulatory compliance. No additional personal information is collected unless absolutely necessary.
- Data Anonymization & Masking: Where applicable, sensitive customer data is anonymized or pseudonymized to reduce the risk of exposure in case of a data breach. For example, stored IP addresses may be hashed or encrypted to prevent direct identification.
- Automatic Data Expiry: Customer data that is no longer needed is automatically deleted or archived in a secure environment. 3.5 Backup & Disaster Recovery
To protect against data loss and ensure business continuity, we have a comprehensive data backup and disaster recovery strategy in place.
- Daily Automated Backups: All customer data is backed up daily across multiple geographically separated data centers.
- Redundant Storage Locations: Backups are stored in secure, encrypted environments with access restricted to authorized personnel only.
- Disaster Recovery Plan (DRP): We have a disaster recovery plan that ensures business continuity in the event of a cyberattack, natural disaster, or hardware failure.
- Regular Backup Integrity Checks: Backups are tested periodically to verify integrity and ensure that data can be restored accurately in case of a system failure.
- Fast Recovery Process: In case of data corruption or loss, we can restore services quickly with minimal downtime. 3.6 Employee Security Training
We recognize that human error is one of the most common causes of security breaches. To mitigate this risk, we provide regular cybersecurity training to all employees handling customer data.
- Security Awareness Programs: Employees are trained in data protection best practices, secure password management, phishing attack prevention, and handling customer data securely.
- Confidentiality Agreements: Employees with access to customer data are required to sign strict confidentiality agreements to prevent unauthorized sharing or misuse of information.
- Limited Data Exposure: Employees are only granted access to specific data required for their job functions to minimize the risk of exposure.
- Regular Security Drills: We conduct cybersecurity drills and simulated phishing tests to educate employees on recognizing and responding to security threats. 3.7 Incident Monitoring & Response
To identify, analyze, and mitigate security threats in real-time, we have implemented 24/7 monitoring systems and a dedicated incident response team.
- Real-Time Security Monitoring: Our security team continuously monitors network traffic, server logs, and system activity for signs of suspicious behavior.
- AI-Powered Threat Detection: We utilize artificial intelligence (AI) and machine learning to analyze network activity and detect potential security threats before they cause damage.
- Automated Alerts & Rapid Response: Any detected anomaly triggers an automated security alert, allowing our security team to respond immediately.
- Incident Response Team (IRT): A dedicated team of cybersecurity experts is responsible for investigating, containing, and mitigating security incidents.
- Forensic Investigation: In the event of a security breach, a detailed forensic analysis is conducted to identify the root cause and prevent future occurrences.
- Data Breach Notification: If a data breach occurs, affected customers will be notified promptly, and corrective actions will be taken to mitigate risks.
4. Data Retention Policy
4.1 Account Information
- Retention Period: Customer account information is stored as long as the customer has an active service with STPL.
- Purpose: This data is retained to provide uninterrupted service, facilitate account management, and handle customer inquiries.
- Deletion Process: Upon account termination, all personal account data is securely deleted within 90 days, except for legally required records.
4.2 Billing Data
- Retention Period: 5 years from the last transaction, as required by telecom and tax regulations.
- Purpose: This ensures compliance with tax laws, audit requirements, and dispute resolution procedures.
- Deletion Process: After the retention period, billing data is permanently erased from our systems unless a legal or regulatory obligation requires further storage.
4.3 Service Logs
- Retention Period: 12 months, as mandated by regulatory compliance requirements.
- Purpose: Service logs, including connection timestamps, assigned IP addresses, and session durations, are stored for troubleshooting, fraud prevention, and law enforcement requests.
- Deletion Process: After 12 months, service logs are automatically deleted from active databases unless retention is required for security investigations or legal compliance.
4.4 Support Data
- Retention Period: 24 months from the date of the last customer interaction.
- Purpose: Retaining support records helps improve service quality, resolve ongoing issues, and maintain records for legal and compliance purposes.
- Deletion Process: After 24 months, all chat logs, email correspondence, and call recordings are securely purged from our systems unless retention is required for legal reasons.
4.5 Data Deletion & Anonymization
- Once the retention period expires, we take the following actions to ensure data security: ✅ Secure Deletion: Data is permanently erased using industry-standard methods to prevent unauthorized access. ✅ Anonymization: Where applicable, customer data is anonymized to remove personally identifiable information while retaining statistical insights for service improvement.
- STPL ensures that all data retention and deletion practices comply with applicable laws and industry standards to protect customer privacy.
5. Third-Party Data Sharing
5.1 Limited Third-Party Data Sharing
We only share customer data with trusted third-party service providers who are essential for delivering our services. These include:
- JanitorRadius – Used for Internet Management & Billing System, ensuring accurate account management, service provisioning, and billing operations.
- Government Authorities – Data is shared only when legally required (e.g., in response to a valid legal warrant, court order, or regulatory request) to comply with telecom regulations and national security laws.
5.2 Security & Compliance of Third-Party Partners
Any third-party service providers we engage with are legally bound to:
✅ Follow strict data protection policies and encryption protocols to secure customer data.
✅ Use customer data only for the agreed-upon purposes and not for any unauthorized activities.
✅ Comply with applicable data protection laws and telecom regulations to ensure privacy and security.
5.3 No Unauthorized Data Transfers
- We do not share customer data with advertisers, marketing agencies, or external analytics firms.
- We do not engage in any form of customer data monetization.
- We do not transfer customer data outside India unless required for regulatory compliance.
STPL remains committed to protecting customer information and ensuring that data shared with third-party service providers is handled securely, lawfully, and with the highest privacy standards.
6. Your Rights & Choices
6.1 Right to Access
You can request a copy of the personal data we hold about you. This includes details such as:
✅ Your account information (name, address, contact details)
✅ Service history and usage data
✅ Billing and payment records
To request a copy, you must submit a formal request with identity verification to prevent unauthorized access.
6.2 Right to Correction
If your personal data is inaccurate or incomplete, you have the right to request corrections or updates.
✅ You can update your contact details, billing information, and service preferences through our customer portal or by contacting support.
6.3 Right to Deletion (“Right to be Forgotten”)
You can request deletion of your data if:
✅ You no longer use our services and wish to have your account data removed.
✅ You believe your data is being processed unlawfully.
✅ The data is no longer necessary for the purposes for which it was collected.
Exceptions: Certain data (such as billing records) may be retained for legal, tax, or regulatory reasons.
6.4 Right to Restrict Processing
If you object to how we use your data, you can request to limit or restrict its processing.
✅ This applies if you dispute the accuracy of your data, object to data usage, or require the data for legal claims.
During the restriction period, your data will be stored securely but not processed for any purpose other than compliance with your request.
6.5 Right to Withdraw Consent
If you previously gave explicit consent for data processing (e.g., marketing communications, optional data collection), you can withdraw it at any time.
✅ Upon withdrawal, we will stop processing your data for those specific purposes immediately.
6.6 How to Exercise Your Rights
To exercise any of these rights, you can contact us at:
📧 Email: sales@technosysonline.com
Upon receiving your request, we will process it within 30 days, subject to verification and legal requirements. STPL is committed to ensuring that your data is handled fairly, securely, and in compliance with privacy laws.
7. Cookies & Tracking
Our website uses cookies and tracking technologies to improve user experience, enhance site functionality, and optimize service performance. By using our website, you agree to the use of cookies as outlined in this policy.
7.1 What Are Cookies?
Cookies are small text files stored on your device (computer, tablet, or mobile) when you visit our website. These files help us recognize your preferences, provide personalized services, and analyze website traffic.
7.2 How We Use Cookies
We use cookies for the following purposes:
Enhancing User Experience – Remembering your login details, preferences, and previously visited pages for seamless browsing.
Performance & Analytics – Tracking website traffic patterns to improve functionality and loading speeds.
Personalization – Offering tailored content based on browsing history and past interactions.
7.3 Managing Your Cookie Preferences
You can control or disable cookies through your browser settings. Most browsers allow you to:
✅ Block cookies from being stored.
✅ Delete cookies stored on your device.
✅ Enable notifications before a website places a cookie.
Note: Disabling cookies may affect certain functionalities, such as personalized settings or faster website performance.
For more information on managing cookies, refer to your browser’s help section:
- Google Chrome: Manage Cookies
- Mozilla Firefox: Manage Cookies
- Microsoft Edge: Manage Cookies
- Apple Safari: Manage Cookies
8. Contact Information
If you have any questions or concerns about this Privacy Policy, contact us at:
Email: sales@technosysonline.com
Phone: +91 9998259045, +91 6355755910, +91 7043539045
Website: www.technosysonline.com
Registered Office: C-18/19, First Floor, Amardeep Complex, Rajpipla Road, Ankleshwar – 393002
Corporate Office: 315, Golden Square, Valia Road, Near Jayaben Modi Hospital, Ankleshwar – 393002