Terms & Conditions

/

Terms & Conditions

Reason for Data Collection

Personal information is utilized to ensure the security of real estate management systems by verifying user identities, preventing unauthorized access, and safeguarding against fraud and other unlawful activities. It is collected and used strictly in alignment with the individual's consent, preferences, and relevant privacy laws, ensuring transparency and compliance at every step. This approach protects sensitive data while fostering trust and maintaining the integrity of the system.

Information Collection

Details regarding the collection of personal information, including but not limited to names, addresses, contact details, and any sensitive information relevant to interior design services or specific project requirements.

Disclosure to Third Parties

Outline the various external entities with which the agency may share personal information, such as contractors, consultants, vendors, partner organizations, or other government agencies. Explain the rationale for sharing information with these third parties, including purposes like enabling service delivery, conducting research and analysis, supporting collaborative projects, or fulfilling legal obligations.

Provide details on the specific types of personal information shared, alongside strict limitations governing how these third parties may use the data, ensuring it aligns with the intended purpose and complies with privacy standards.

Purpose and Utilization of Information

Details about the types of personal information collected, such as names, addresses, contact information, and possibly sensitive information related to interior services or projects.

Rights of Individuals

Details about the types of personal information collected, including names, addresses, contact details, and potentially sensitive information related to interior design services or specific project requirements.

Data Protection Measures

To safeguard personal information against unauthorized access, disclosure, alteration, or destruction, robust security measures are employed. These may include encryption to secure data during transmission and storage, stringent access controls to restrict unauthorized personnel, and regular security assessments to identify and address vulnerabilities.

When personal information is no longer needed for its intended purpose, it is securely disposed of or anonymized. Methods may include shredding physical documents, permanently deleting electronic records, or applying data anonymization techniques to remove any identifiable elements, ensuring privacy is maintained.

Cross-Border Data Exchange

The movement of personal or organizational data across national borders to facilitate global operations, collaboration, and compliance with international regulations."

This phrasing emphasizes its role in enabling global connectivity while acknowledging the legal and logistical considerations.

Legal Basis for Processing

Details about the types of personal information collected, such as names, addresses, contact information, and possibly sensitive information related to interior services or projects.