X T e n

Loading

Welcome to XTen, a leading IT company dedicated to transforming businesses through technology! 💻 At XTen, we specialize in providing comprehensive IT solutions that drive efficiency, innovation, and growth. From software development to cybersecurity and beyond, our talented team is committed to delivering top-notch services tailored to meet our clients' unique needs. Join us on our journey to redefine the possibilities of IT!

Introduction

Xten respects your privacy and is committed to protecting your personal data. This privacy policy will inform you about how we handle your personal data when you use our services.

Data Collection

Types of Data Collected

  • 1) Personal identification information (name, email address, phone number, etc.)
  • 2) Technical data (IP address, browser type, operating system, etc.)
  • 3) Usage data (pages visited, time spent on site, etc.)
    Methods of Collection

1)Direct interactions (forms, emails, phone calls)
2)Automated technologies (cookies, web beacons)

Use of Data

Purpose of Data Use

1) To provide and improve our services.
2) To communicate with you.
3) For marketing and promotional purposes.
4) To comply with legal obligations.

Legal Basis

1) Your consent.
2) Performance of a contract.
3) Compliance with legal obligations.
4) Legitimate interests.

Data Sharing and Disclosure

Third-Party Sharing
1) Service providers (hosting, payment processing, etc.)
2) Business partners.
3) Legal authorities when required.
Purpose of Sharing

1) To enable service delivery.
2) For marketing purposes.
3) To comply with legal requirements.

Data Security

Security Measures

1) Encryption of data in transit and at rest.
2) Access controls and authentication procedures.
3) Regular security audits and assessments.
Breach Notification
1) Prompt notification of affected individuals in case of a data breach.

Data Retention

Retention Periods

1) Personal data is retained as long as necessary to fulfill the purposes outlined in this policy.
2)Specific retention periods vary depending on the type of data and legal requirements.
Deletion Procedures
1) Secure deletion methods are used to erase personal data once it is no longer needed.

User Rights

Access and Correction:

You have the right to access and correct your personal data.
Deletion and Objection:

You can request the deletion of your data or object to its processing.
Data Portability:

You have the right to receive your data in a portable format.

Cookie Policy

Use of Cookies:

We use cookies to enhance your experience on our website.
User Choices:

You can manage your cookie preferences through your browser settings.

 

Changes to the Policy

Policy Updates:

We will notify you of any changes to this privacy policy via email or our website.
Review Frequency:

This policy is reviewed annually.

 

Contact Information

If you have any questions about this privacy policy or your personal data, please contact us at: