Privacy Policy

The issue of online security is very urgent for Leo IT Services which is focused on shielding the data given by its individuals (enlisted clients) and different guests (unregistered clients) signing on to its Site. Leo IT Services is devoted to establish a solid climate for web.



Regarding the protection of its internet based guests while giving first in class web and programming improvement, games improvement, portable application advancement and computerized promoting to its enlisted client has stayed the center of Leo IT Services system. Our Security Strategy provides guests with a perspective on the Protection Practices followed by



Leo IT Services and guarantees them of safe entry through the site for building safe internet based local area.



Simultaneously, Leo IT Services might want to clarify that its webpage gives connects to other Sites that are administered by their own Protection Arrangements and doesn't assume a sense of ownership with the security given by these locales.



Guests to the Leo IT Services site are encouraged to find out more about its Protection Strategy too the arrangements of the destinations that gather by and by recognizable data.



At the point when you furnish us with your own information, you are consenting to the standards and guidelines specified under our Protection Strategy and are limited by it. In the event that you don't consent to our Approach kindly don't utilize the Site.



The Security Strategy covers the accompanying regions:



1. Kind of data gathered through the Site Individual Data



Clients enlisting at the Leo IT Services site are mentioned to give some by and by recognizable data which turns into the property of Leo IT Services and can be shared, revealed or dispersed to outsiders as it were as per the Protection Strategy. It should be explained here that enlistment isn't needed for guests to the site who require no particular administrations.



2. Use and Divulgence of individual data



Leo IT Services won't sell or lease such by and by recognizable data gathered. The actually recognizable data is provided willfully for a portion of the accompanying motivations:





Enlistment Information and Other Discretionary Data:



In the event that you are just a guest to our site, Leo IT Services doesn't gather any private data about you, but to the restricted degree using treats, as depicted beneath. In the event that you choose to utilize certain administrations presented on the site, you will be approached to enroll on enlistment interface. During enrollment you will be mentioned to finish an enrollment structure setting out fundamental internet based contact data. about yourself. Such data incorporates Name, Email ID, skype ID, Organization name, Contact Number.



At the point when we get messages from you, we might hold the substance of any email messages shipped off us, as well as subtleties of your email address.



• Utilization of electronic following systems like Treats:



Treats, which empower us to store modest quantities of data contained in your Site program, might be utilized on certain region of our Site. Treats, that assist us with following your route, empower us to tailor our contributions to your requirements. The sort of data that might be put away on a treat incorporates enlistment information with the goal that a client doesn't have to reemerge the data each time he/she visits a specific region, client IP address, client ISP subtleties, client search track/log subtleties and client program subtleties. Outsider Sites which are open from our Site by means of connections, navigate or standard publicizing might utilize Treats. In any case, we actually should illuminate you that we have no entrance or command over such Treats and don't acknowledge liability with respect to them.



3. Decision OR quit



Leo IT Services gives you the decision with respect to the assortment and utilization of your actually recognizable data. During enlistment for "joining our mailing list," we demand for contact data to send announcements and for the purpose of publicizing. Once more, it isn't required for you to enroll to get to furthermore, utilize our Site. You may subsequently decide to quit giving such data. Further, when you are enlisted at the Leo IT Services site, you will have the choice at any stage to illuminate us that you never again wish to get future messages and you may "withdraw" by reaching on support@leoitservices.in



4. Security Practices According to I.T.Act, 2000 and Rules of I.T.Act, 2000 (Overhauled according to Correction in I.T.Act,



2000 and its standards)



Leo IT Services has carried out severe, globally satisfactory guidelines of innovation and functional security to shield actually recognizable data from misfortune, abuse, adjustment or annihilation.



The information dwells behind a firewall, with access limited to approved Leo IT Services personnel. IDS, IPS and other cutting edge security arrangements through outsider server farm servers for a got client experience. Leo IT Services has carried out "Sensible Security Practices" as expected by the Data



Innovation Act, 2000 standards remembering any revision for the said Act and rules. By agreeing with such arrangements, Leo IT Services guarantees appropriate consideration and command over its I.T. what's more, Security tasks under segments



43, 43A, 45 and Area 85 of I.T.Act, 2000 including related rules. By utilizing this site you concur that Leo IT Services will not be considered answerable for any wild security assault and in such cases you concur that



Leo IT Services will not be considered liable for a monetary, opportunity, lawful, business and notoriety misfortunes that might happen to you under the Arrangements of Area 43, 43A and 45 of Data Innovation Act,



2000 and remembering any corrections for the said Act. You further concur that Leo IT Services the executives will not be considered capable straightforwardly or by implication for any digital wrongdoing related criminal liabilities under I.T.Act, 2000 connecting with your data as you concur and recognize that administration of Leo IT Services conforms to an expected level of effort prerequisites of I.T.Act, 2000 including its standards and corrections. For questions in regards to the security articulation, practices of the site, or some other exchange issue, if it's not too much trouble, contact support@leoitservices.in .We are exceptionally delicate to the kids security. Assuming you come to realize that your kid has given wrong age data on Leo IT Services then kindly contact support@leoitservices.in to elaiminate such information.