Privacy Policy

Effective Date: 25-02-2025

Last Updated: 25-02-2025

1. INTRODUCTION

Witzeal Technologies Private Limited ("Company," "we," "us," or "our") is committed to protecting the privacy and personal data of users who visit our corporate website (the "Website"). This Privacy Policy outlines the types of personal data we collect, how we use, share, and protect it, and your rights regarding your personal data.

This Privacy Policy applies exclusively to the corporate Website and not to any separate gaming platforms, applications, or services operated by us. If you interact with our gaming platforms, additional privacy policies may apply.

By accessing or using the Website, you consent to the data practices described in this Privacy Policy. If you do not agree, please discontinue your use of the Website immediately.

2. INFORMATION WE COLLECT

We collects various types of information to improve the Website’s functionality, enhance user experience, and ensure compliance with legal and regulatory requirements. The data we collect includes, but is not limited to, the following:

2.1 Personal Information (Directly Provided by You)

We collect personal data that you voluntarily provide when interacting with our Website, including but not limited to:

  • Identification Data: Full name, contact details (email address, phone number, postal address), company name, job title, and other business-related information provided through inquiry forms, registration portals, career applications, or direct communication.
  • Communication Records: Any correspondence sent via emails, messages, support requests, or other communication channels, including chat logs or call recordings (where applicable).
  • Business Inquiries and Proposals: Information related to potential partnerships, vendor engagements, investor relations, and other business communications.

2.2 Automatically Collected Information

When you access the Website, we may automatically collect certain data through cookies, log files, and tracking technologies, including:

  • Technical and Device Information: IP address, device type, operating system, browser type and version, screen resolution, and network provider details.
  • Usage Data: Pages visited, time spent on the Website, clickstream behaviour, referral sources, and interactions with Website content.
  • Geolocation Data: Approximate geographic location derived from IP address or other identifiers (where permitted by applicable law).

2.3 Information from Third-Party Sources

We may obtain personal and non-personal information from external sources, including:

  • Business Partners & Affiliates: Data shared with us by vendors, service providers, or industry partners to facilitate business operations.
  • Publicly Available Sources:Information from corporate directories, professional networking platforms (e.g., LinkedIn), government registries, and publicly accessible databases.
  • Marketing & Analytics Providers:Aggregated insights or behavioural data provided by marketing firms, analytics tools, or advertising partners.

2.4 Cookies and Tracking Technologies

To enhance user experience and ensure optimal Website performance, we utilize cookies, pixel tags, web beacons, and similar technologies. These tracking mechanisms help us:

  • Remember user preferences and personalize content.
  • Monitor and analyze Website performance and user behaviour.
  • Detect security threats, fraudulent activity, or unauthorized access.
  • Improve targeted advertising, where applicable.

Users may modify cookie preferences through their browser settings, though disabling certain cookies may affect the Website’s functionality.

2.5 Sensitive Personal Data

We do not intentionally collect or process sensitive personal data (such as financial details, biometric data, religious beliefs, or health records) unless explicitly required for compliance or legal purposes. If you voluntarily submit such information, you acknowledge that you do so at your own discretion.

3. HOW WE USE YOUR INFORMATION

We processes the collected information for various business, operational, security, and compliance purposes. The data is utilized in ways that align with our legal obligations, business interests, and industry standards. The primary purposes for processing user data include, but are not limited to:

3.1 Website Operations & User Experience Enhancement

  • To provide, manage, and improve the functionality, accessibility, and performance of our Website.
  • To analyze user behaviour, interactions, and engagement to enhance the Website’s usability and content relevance.
  • To conduct system diagnostics, troubleshoot technical issues, and ensure smooth operation across devices and browsers.

3.2 Business Communications & Customer Engagement

  • To respond to inquiries, support requests, or business proposals submitted via forms, emails, or other communication channels.
  • To facilitate professional interactions, investor relations, vendor communications, and partnership discussions.
  • To send service-related notifications, updates, and administrative messages.

3.3 Legal & Regulatory Compliance

  • To comply with applicable laws, regulations, government requests, and industry standards, including obligations under the Information Technology Act, 2000, DPDP Act, 2023, and other relevant laws.
  • To respond to legal proceedings, subpoenas, law enforcement inquiries, or regulatory audits.
  • To protect our legal rights, investigate fraud, prevent misuse, and enforce contractual obligations.

3.4 Security, Fraud Prevention & Risk Management

  • To monitor and prevent unauthorized access, cyber threats, fraudulent activities, and data breaches.
  • To authenticate user identity, manage security logs, and investigate suspicious behaviour.
  • To enhance the Website’s cybersecurity framework, including encryption, firewalls, and intrusion detection systems.

3.5 Analytics, Research & Business Intelligence

  • To analyze Website traffic, visitor demographics, and user behaviour for data-driven decision-making.
  • To conduct research, surveys, and performance analysis to enhance business strategies and operational efficiency.
  • To measure the effectiveness of content, marketing campaigns, and SEO strategies.

3.6 Marketing & Promotional Activities (Where Applicable & Permitted by Law)

  • To send newsletters, industry insights, event invitations, or promotional materials to users who have opted-in.
  • To personalize content recommendations and advertisements based on user preferences and browsing patterns.
  • To engage in remarketing campaigns using aggregated and anonymized data, without compromising user privacy.
  • Users can opt out of marketing communications at any time by following the instructions in the emails or contacting us directly.

3.7 Corporate Transactions & Business Interests

  • To facilitate mergers, acquisitions, joint ventures, business restructuring, or asset transfers.
  • To assess business performance, financial planning, and potential expansion strategies.
  • In the event of a corporate transition, information may be transferred to successors, subject to appropriate safeguards.

3.8 Employee Recruitment & Career Applications

  • To review and process job applications submitted through the Website.
  • To evaluate candidates for hiring, internship, or contractual opportunities.
  • To maintain records for future job openings and HR compliance.

3.9 Personalization & AI-Based Enhancements (If applicable)

  • To tailor user experiences based on previous interactions, preferences, and behavioural patterns.
  • To implement AI-driven chatbots, recommendation engines, or automated responses for improved efficiency.
  • To optimize content delivery and improve accessibility features for a diverse audience.

4. SHARING AND DISCLOSURE OF INFORMATION

We do not sell, rent, or trade personal data for commercial gain.. However, we may share user information under specific circumstances to ensure business operations, compliance with legal requirements, and the protection of our interests. Information may be shared with the following entities, subject to strict confidentiality, security, and legal obligations:

4.1 Service Providers & Business Partners

We engage reputable third-party vendors, contractors, and business partners to assist with various operational functions, including but not limited to:

  • IT & Cloud Services: Website hosting, data storage, cybersecurity, cloud computing, and infrastructure management.
  • Analytics & Marketing Firms: Performance tracking, audience insights, advertising networks, and digital marketing campaigns.
  • Customer Support & Communication Providers: Helpdesk services, email processing, and automated messaging platforms.
  • Payment & Financial Processors: (If applicable) Payment gateways, invoicing systems, and financial transaction facilitators.

All service providers are contractually obligated to handle personal data in compliance with applicable privacy laws and security best practices.

4.2 Legal & Regulatory Authorities

We may disclose user information to comply with legal, regulatory, or governmental requests, including:

  • Regulatory Compliance: Compliance with Indian IT laws, DPDP Act, 2023, RBI guidelines, or sector-specific regulations.
  • Legal Investigations & Court Orders: Responding to summons’s, law enforcement inquiries, fraud investigations, or legal proceedings.
  • Prevention of Unlawful Activities: Protecting against fraud, cybercrime, security threats, or unauthorized access to our systems.

Such disclosures are made only when legally mandated, and we ensure that due process and confidentiality protections are observed.

4.3 Corporate Affiliates & Group Entities

As part of a larger business ecosystem, we may share data with:

  • Parent Companies, Subsidiaries, & Affiliates: For corporate governance, financial planning, risk assessment, and operational synergies.
  • Joint Ventures & Strategic Partnerships: To facilitate business growth, crossindustry collaborations, or co-branded initiatives.

In such cases, data sharing is conducted under strict corporate governance policies to prevent unauthorized access or misuse.

4.4 Business Transfers, Mergers & Acquisitions

In the event of a corporate transition, user information may be shared as part of:

  • Mergers, acquisitions, or asset sales.
  • Corporate restructuring, financing, or investment transactions.
  • Bankruptcy, dissolution, or liquidation proceedings.

If such changes occur, we will ensure continued protection of personal data and notify users of any significant policy changes.

4.5 Third-Party Advertising & Remarketing (Where Applicable & Permitted by Law)

We may collaborate with advertising networks and data partners for:

  • Targeted advertising and content personalization.
  • Retargeting campaigns based on anonymized browsing behaviour.
  • Performance analysis to improve marketing effectiveness.

Users can manage ad preferences or opt out of targeted advertising through browser settings or industry-standard opt-out mechanisms.

4.6 Security, Fraud Prevention & Risk Mitigation

We may share data when necessary to:

  • Investigate, prevent, or address fraud, security breaches, or unauthorized access.
  • Protect our legal rights, enforce contractual obligations, or defend against legal claims.
  • Mitigate cybersecurity threats and safeguard business operations.
4.7 Aggregated, Anonymized, & De-Identified Data

For research, statistical analysis, and business intelligence purposes, we may share nonpersonally identifiable information with external stakeholders, ensuring that individual identities remain protected.

5. COOKIES AND TRACKING TECHNOLOGIES

We use cookies and similar tracking technologies to enhance user experience, analyze website performance, and improve security. These technologies allow us to understand user interactions, personalize content, and optimize our services. By using our website, you consent to the use of cookies and tracking mechanisms in accordance with this Privacy Policy.

5.1 What Are Cookies?

6. DISCLAIMER OF WARRANTIES

Cookies are small text files stored on your device (computer, tablet, or mobile) when you visit a website. They help websites remember your preferences, login details, and browsing behaviour, ensuring a smoother and more personalized experience.

We use different types of cookies, including:

  • Session Cookies: Temporary cookies that expire when you close your browser.
  • Persistent Cookies: Remain stored on your device for a specified period to retain settings and preferences.
  • First-Party Cookies: Set directly by us for core website functionalities.
  • Third-Party Cookies: Placed by third-party providers for analytics, advertising, and performance monitoring.
5.2 Types of Cookies We Use

A. Essential & Functional Cookies (Strictly Necessary)

  • Enable website functionality, security features, and navigation.
  • Maintain session stability and prevent fraudulent access.
  • Store user preferences, such as language settings and consent choices.

Without these cookies, certain Website functions may not operate correctly.

B. Performance & Analytics Cookies (User Behaviour Tracking)

  • Collect insights on page visits, time spent on pages, and browsing patterns.
  • Help us diagnose technical issues and improve overall performance.
  • Used by tools like Google Analytics, Hotjar, and similar tracking services (where applicable).

C. Advertising & Marketing Cookies (Targeted Advertising & Remarketing)

  • Used for personalized ads, retargeting campaigns, and behavioural profiling.
  • Track interactions with marketing emails, landing pages, and online promotions.
  • Shared with advertising networks, including Google Ads, Facebook Pixel, LinkedIn Insights, etc. (where applicable).

D. Security & Fraud Prevention Cookies (Risk Mitigation & Cybersecurity)

Monitor login attempts and detect unusual activities.

Prevent bot attacks, spam, and unauthorized access.

Enhance security protocols for safe browsing.

5.3 Web Beacons, Pixels, and Other Tracking Mechanisms

In addition to cookies, we may use pixel tags, web beacons, and JavaScript-based tracking to:

  • Measure engagement with emails and digital campaigns.
  • Analyze referral sources and external traffic patterns.
  • Identify potential security threats and suspicious activities.

These technologies do not collect personally identifiable information unless explicitly provided by the user.

5.4 Managing Cookie Preferences

You have full control over how cookies are used on your device. You can:

  • Modify browser settings to accept, reject, or delete cookies.
  • Enable “Do Not Track” (DNT) settings if supported by your browser.
  • Use third-party opt-out tools such as the Network Advertising Initiative (NAI) or Digital Advertising Alliance (DAA) for marketing cookies.

Note: Disabling certain cookies may impact Website functionality and limit personalized features.

5.5 Third-Party Integrations & Data Sharing

Some cookies belong to third-party service providers. These providers have their own privacy policies governing data collection, and we do not have direct control over their tracking practices. Third-party tools we use may include:

  • Google Analytics (for website performance tracking)
  • Facebook Pixel & LinkedIn Insights (for ad retargeting and conversion analysis)
  • Cloudflare / Similar Security Services (for DDoS protection and fraud prevention)

We recommend reviewing third-party cookie policies for more details on their data handling practices.

6. DATA SECURITY

We are committed to ensuring the confidentiality, integrity, and security of the information collected through our Website. We implement industry-standard security measures to protect against unauthorized access, alteration, disclosure, or destruction of data. However, no method of transmission over the internet or electronic storage is 100% secure, and while we strive to protect your personal information, we cannot guarantee absolute security.

6.1 Security Measures Implemented

To safeguard your data, we employ a combination of technical, administrative, and physical security controls, including but not limited to:

A. Encryption & Secure Data Transmission
  • All data transmissions are secured using Transport Layer Security (TLS 1.2/1.3) encryption protocols to prevent unauthorized interception.
  • Sensitive information, such as login credentials, is encrypted using AES-256 encryption for maximum security.
B. Access Controls & Authentication
  • Role-Based Access Controls (RBAC): Employees and authorized personnel have limited access to data based on job responsibilities.
  • Multi-Factor Authentication (MFA): Used to prevent unauthorized access to internal systems.
  • Regular Access Audits: Periodic reviews of access permissions to prevent data misuse.
C. Firewalls & Intrusion Detection Systems
  • Deployment of next-generation firewalls (NGFWs) to monitor and filter incoming traffic.
  • Use of Intrusion Detection and Prevention Systems (IDPS) to detect anomalies and potential cyber threats.
D. Secure Storage & Data Minimization
  • Data is stored in ISO 27001-certified cloud environments with multi-layered security protocols.
  • Personal data is retained only for as long as necessary and securely deleted when no longer required.
E. Continuous Monitoring & Threat Mitigation
  • 24/7 security monitoring using automated tools to detect and respond to vulnerabilities.
  • Regular penetration testing and vulnerability assessments to identify weaknesses and mitigate risks.
  • Use of AI-driven anomaly detection systems for advanced threat intelligence.
6.2 Incident Response & Data Breach Management

Despite our best efforts, unforeseen security breaches may occur. In such cases, we have a comprehensive incident response plan, including:

  • Immediate Containment & Investigation: Identifying the breach source, scope, and impact.
  • Regulatory Compliance & Notifications: If required by law (such as the DPDP Act, 2023), affected users and relevant authorities will be notified within legally mandated timelines.
  • Remediation & Future Prevention: Implementing corrective measures, patching vulnerabilities, and strengthening security protocols to prevent recurrence.
6.3 User Responsibilities for Security

While we implement robust security measures, users must also take proactive steps to protect their information, including:

  • Using strong, unique passwords and enabling two-factor authentication where applicable.
  • Avoiding sharing personal credentials or sensitive data through unverified channels.
  • Keeping their devices updated with the latest security patches and antivirus software.
6.4 Third-Party Security Risks

Although we work with trusted third-party service providers, we do not control their security practices. Users should review third-party privacy policies and exercise caution when engaging with external links or services integrated into our Website.

6.5 Compliance with Data Protection Laws

Our security framework aligns with the following data protection and cybersecurity regulations:

  • Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
  • Digital Personal Data Protection (DPDP) Act, 2023
  • General Data Protection Regulation (GDPR) (where applicable for international users)
  • ISO 27001 and NIST Cybersecurity Framework (where applicable)

By implementing these measures, we ensure that user data is handled with the highest standards of security and regulatory compliance.

7. DATA RETENTION

We retain personal and non-personal data only for as long as necessary to fulfil the purposes outlined in this Privacy Policy, comply with legal obligations, resolve disputes, enforce agreements, and protect our legal and business interests. We implement structured data retention and disposal policies to ensure information is managed securely and responsibly.

7.1 Retention Periods for Different Categories of Data

The retention duration of collected data varies based on its nature, legal requirements, and business purposes:

A. Account & Profile Information
  • User account details, registration data, and communication history are retained as long as the account remains active.
  • If an account is deleted, we securely erase or anonymize the data within 7 days, unless legally required to retain it.
B. Transactional & Payment Data (If applicable)
  • Financial records, invoices, and payment history are retained for a minimum of 1 years as required under tax and financial regulations.
  • If payment data is processed via third-party gateways, their retention policies will apply.
C. Usage & Analytics Data
  • Aggregated and anonymized usage statistics may be retained indefinitely for business intelligence, analytics, and service improvement.
  • Non-essential logs and temporary analytical data are periodically purged or anonymized.
D. Communication & Support Interactions
  • Customer service inquiries, feedback, and chat transcripts are retained for up to 1 months for dispute resolution and service improvement.
  • If a user requests deletion, we will remove records except where retention is required for legal or regulatory purposes.
E. Legal, Compliance & Security Data
  • Data associated with legal claims, compliance investigations, or regulatory audits is retained for the required statutory period.
  • Security logs, fraud detection records, and access logs are retained for 6 months to 1 years, depending on applicable cybersecurity laws.
7.2 Criteria for Data Retention & Deletion

The decision to retain or delete data is based on the following factors:

  • Legal & Regulatory Compliance: Data retention obligations under IT Act, 2000, DPDP Act, 2023, taxation laws, and other Indian regulations.
  • Contractual & Business Necessity: Ensuring continuity of services, enforcing terms, and managing legal risks.
  • User Preferences & Requests: Users can request deletion of specific personal data, subject to legal and operational constraints.
  • Technical & Security Considerations: Storage limitations, security risks, and necessity for business intelligence.
7.3 Secure Deletion & Anonymization

Once the retention period expires, we follow industry-standard data disposal practices to ensure complete and secure data removal. Methods include:

  • Data Anonymization: Identifiable information is stripped from datasets to allow indefinite retention without privacy risks.
  • Secure Deletion: Data is permanently erased using NIST 800-88 and ISO 27001- compliant deletion protocols.
  • Backup & Archive Removal: Redundant copies in backup systems are deleted as per pre-defined lifecycle policies.
7.4 User Rights & Data Deletion Requests
  • Users may request deletion of their personal data by contacting [support email/contact form].
  • Requests will be processed within a reasonable timeframe, subject to verification of identity and legal obligations.
  • Certain data may be retained even after a deletion request if required for legal compliance, fraud prevention, or security investigations.
7.5 Retention of Non-Personal & Anonymized Data

For research, analytics, and business intelligence, we may retain de-identified or anonymized data indefinitely, ensuring that it cannot be traced back to individual users.

8. YOUR RIGHTS AND CHOICES

We respect your rights regarding the collection, use, and sharing of your personal data. Subject to applicable laws, including the Digital Personal Data Protection (DPDP) Act, 2023, the Information Technology Act, 2000, and other relevant global privacy regulations (where applicable), you have certain rights over your personal information. Below, we outline your rights and how you can exercise them..

8.1 Your Rights
A. Right to Access Your Data

You have the right to request details about the personal information we hold about you, including:

  • Categories of data collected
  • Purposes of processing
  • Third parties with whom we have shared your data
  • Data retention periods

Upon verification of your identity, we will provide this information within the legally mandated timeframe.

B. Right to Rectification (Correction of Inaccurate Data)

If you believe any personal information we hold is inaccurate, incomplete, or outdated, you may request corrections. We will review and update the data promptly, ensuring compliance with regulatory timelines.

C. Right to Withdraw Consent

Where processing is based on your explicit consent, you have the right to withdraw it at any time. This may impact the availability of certain services but will not affect the lawfulness of processing based on consent before withdrawal.

D. Right to Erasure (Right to Be Forgotten)

You may request deletion of your personal data under the following conditions:

  • The data is no longer necessary for its original purpose.
  • You withdraw consent, and there are no overriding legal grounds for retention.
  • The data was unlawfully processed.
  • Legal obligations require its deletion.

However, we may retain certain data if required by law, for fraud prevention, or to comply with legal claims.

E. Right to Object to Processing

You may object to our processing of your personal data under specific circumstances, such as:

  • Processing based on legitimate interests or public interest.
  • Use of data for direct marketing purposes (opt-out options will be provided).

If you object, we will evaluate your request and cease processing unless overriding legal grounds exist.

F. Right to Data Portability (Where applicable)

You have the right to receive your personal data in a structured, commonly used, and machinereadable format and request its transfer to another service provider, where technically feasible

G. Right to Restrict Processing

You may request the temporary suspension of processing if:

  • You contest the accuracy of the data.
  • The processing is unlawful, but you prefer restriction over deletion.
  • You need the data for legal claims, even though we no longer require it.
H. Right to Lodge a Complaint

If you believe your data protection rights have been violated, you have the right to file a complaint with the relevant regulatory authority, including the Data Protection Board of India or any applicable global data protection authority.

8.2 How to Exercise Your Rights

You can exercise these rights by submitting a request through:

For security reasons, we may require you to verify your identity before processing your request.

8.3 Opt-Out & Marketing Preferences
  • You may unsubscribe from marketing emails by clicking the “unsubscribe” link in our communications.
  • You can adjust cookie and tracking preferences using browser settings or our consent management tool.
8.4 Limitations on Rights

Your rights are subject to certain limitations based on:

  • Legal and regulatory requirements (e.g., tax, fraud prevention, compliance obligations).
  • Contractual obligations where data retention is required for ongoing services.
  • Exemptions under applicable laws, including cases where fulfilling a request would violate another person’s privacy or legal rights.

9. INTERNATIONAL DATA TRANSFERS

If data is transferred outside India, we ensure compliance with legal safeguards and contractual obligations to protect user information.

10. THIRD-PARTY LINKS

Our Website may contain links to third-party websites, applications, services, and external content that are not operated, controlled, or owned by us ("Third-Party Services"). These links are provided for informational and convenience purposes only, and we do not endorse, review, or assume responsibility for the privacy practices, security measures, or content of such Third - Party Services.

10.1 No Liability for Third-Party Practices

By clicking on a third-party link or engaging with external services, you acknowledge and agree that:

  • We do not control or monitor how third parties collect, use, or protect your data..
  • We do not provide any guarantees regarding the security, accuracy, legality, or reliability of third-party content.
  • Your interactions with such third parties are solely governed by their respective privacy policies, terms of use, and data protection practices.

We strongly encourage users to review the privacy policies and terms of any third-party websites before providing any personal information or engaging in transactions.

10.2 Third-Party Services We May Use

While we do not control external websites, we may integrate with trusted third -party service providers for functionalities such as:

  • Social Media Plugins – Clicking on a "Share" or "Like" button may allow social platforms like Facebook, LinkedIn, or Twitter to collect data.
  • Analytics & Advertising Tools – Third-party tools (e.g., Google Analytics, Meta Pixel) may track user behaviour, subject to their privacy terms.
10.3 Embedded Content & Tracking Risks

Certain third-party services may use cookies, tracking pixels, or scripts to collect information about your browsing activities. This tracking may occur even if you do not interact with the embedded content. We do not have control over such third-party tracking and advise users to adjust their browser privacy settings or use ad-blocking tools if concerned.

10.4 Third-Party Links & Security Risks

While we strive to provide safe and reputable links, we cannot guarantee that third-party websites are free from:

  • Phishing attempts (fraudulent impersonation of legitimate businesses).
  • Malware, spyware, or viruses that may compromise your device.
  • Unethical data collection practices or misleading content.

Users are advised to exercise caution and ensure they are on a legitimate and secure website before sharing sensitive information.

10.5 Limitation of Liability for Third-Party Services

To the fullest extent permitted by law, we disclaim all liability for any:

  • Loss, damage, or data breaches caused by your use of third-party links or services.
  • Unauthorized data collection or misuse of your personal information by third-party entities.
  • Financial or reputational harm arising from third-party fraud, scams, or misleading content.

You acknowledge that engaging with any third-party services is at your own risk, and you should take necessary precautions to protect your personal information.

11. CHILDREN'S PRIVACY

11.1 Protection of Minors’ Data

We are committed to protecting the privacy and safety of children online. Our website and services are not intended for individuals under the age of 18 (or the applicable age of majority in their jurisdiction). We do not knowingly collect, store, or process personal data from children without verifiable parental consent as required under applicable laws, including the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, and the Digital Personal Data Protection (DPDP) Act, 2023.

11.2 No Intentional Data Collection from Minors

We do not knowingly:

  • Solicit or collect personal data from children.
  • Target our services, marketing, or advertisements toward minors.
  • Allow children to register, create accounts, or access restricted features without proper age verification.

If we become aware that we have inadvertently collected personal data from a minor without parental consent, we will take immediate steps to delete such data from our records

11.3 Parental Controls & Responsibilities

    • We encourage parents and guardians to monitor their children’s online activities and educate them about responsible digital behaviour.
    • If you believe that your child has provided us with personal information without your consent, please contact us immediately at support@witzeal.com, and we will take prompt action.

11.4 Compliance with Child Protection Laws

We comply with all applicable child data protection laws, including:

  • India: The Information Technology Act, 2000 & DPDP Act, 2023
  • Global Standards: Children's Online Privacy Protection Act (COPPA) (U.S.), General Data Protection Regulation (GDPR) – Article 8 (EU) (if applicable)

We take strict security and compliance measures to prevent unauthorized data collection from minors and ensure that our platforms adhere to ethical privacy standards.

11.5 Reporting Unauthorized Child Data Collection

If you suspect that a minor has provided their personal information on our Website, please:

  • Contact us immediately at support@witzeal.com with details of the concern.
  • We will verify the request and take necessary action, including removal of data or seeking parental consent.
  • Where necessary, we will cooperate with relevant authorities to address any violations of child privacy laws.

12. CHANGES TO THIS POLICY

We reserve the right to update, modify, or amend this Privacy Policy at any time to reflect changes in legal requirements, business practices, or technological advancements. Any revisions will be effective upon posting on our Website with an updated “Last Revised” date, and where required by law, we will notify you via email or prominent notice. We encourage you to review this Policy periodically to stay informed about how we protect your information. Your continued use of our Website after any changes constitutes your acceptance of the revised Privacy Policy.

13. CONTACT INFORMATION

For questions regarding this Privacy Policy, contact us at: Witzeal Technologies Pvt Ltd

Digital Greens Emaar Tower-B, Emaar Digital Greens, Unit No. DG-B-02-002 to 005, 2nd Floor, Baharampur Naya, Sector 61, Gurugram, Haryana 122001

support@witzeal.com