The “Information” (including data) provided by you to INZ Axis Tech Services Pvt Ltd or collected from you may consist of “Personal Information” and “Non-Personal Information”. The term Personal Information shall include ‘sensitive personal information or data’ as may be provided under applicable law from time to time and as may be provided by you or collected by INZ Axis Tech Services Pvt Ltd from time to time for the purposes as mentioned herein or as permitted under applicable laws.
Your privacy is important to us. This privacy statement explains what personal data we collect from you and how we use it. References to INZ Axis Tech Services Pvt Ltd. services in this statement include INZ Axis websites, apps, software and devices. We encourage you to read the summaries below. The Service-Specific Details below provide additional information relevant to particular INZ Axis services.
INZ Axis uses the data we collect to provide you the services we offer, which includes using data to improve and personalize your experiences. We also may use the data to communicate with you, for example, informing you about your account, security updates and product information. And we use data to help make the ads we show you more relevant to you.
The INZ Axis website uses online forms where you may be asked to provide certain bits of personal information. This is necessary to access certain services in the website (e.g. academic courses, donations, registrations, books and Journals) or to take part in surveys. By filling out and submitting the form you are understood to have consented to INZ Axis storing and using the information for the purposes for which it has been collected. Security
At, INZ Axis we take every possible precaution to ensure that your data is safe and secure barring circumstances beyond our control. Unfortunately, we cannot guarantee control over the medium of transmission i.e., internet. Though you have to supply the necessary information at your own risk, INZ Axis will always try to ensure the security and safety of the same. Once we receive the data, we will strive to keep it secure using the latest technology, constant upgrades to our digital security infrastructure and restricted access.