Zure Technologies (Pty) Ltd ("we," "us," or "our") respects your privacy and is committed to protecting your personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website, https://zurenet.com (the "Site"), or use our associated applications and services. By using the Site or services, you consent to the practices described in this Privacy Policy.
- Information We Collect
- Personal Information: When you interact with the Site or services, we may collect personal information such as your name, email address (used for logging in, sending due date notifications, and product-specific communications), phone number, and any other information you voluntarily provide.
- Automatically Collected Information: We may collect certain information automatically, including your IP address, browser type, operating system, referring URLs, and usage data related to your interactions with the Site.
- Files and Media: Users can upload photos, PDFs, Excel spreadsheets (.xls), Word documents (.docx), and other files to our systems. These files are securely stored on a Backblaze cloud server to allow users to manage and visualize their products or assets.
- Location Data: We collect latitude and longitude coordinates for each product or asset scan. This data is encrypted and stored securely.
- Camera Usage: The application may use the device’s camera to scan products or assets.
- Cookies and Tracking Technologies: The Site and application may use cookies, web beacons, and similar tracking technologies to enhance your user experience and analyze usage patterns.
- How We Use Your Information
- We may use the information we collect for purposes such as:
- Providing, operating, and maintaining the Site and associated applications.
- Responding to inquiries or providing support.
- Sending updates, due date notifications, promotional materials, or other product-specific communications.
- Analyzing user behavior to improve the functionality and content of our services.
- Storing and displaying product-related images, files, and location data for operational purposes.
- Ensuring data security and compliance with legal obligations.
- Sharing Your Information
- We may share your information in the following situations:
- With Service Providers: To help us operate and manage the Site and applications, we may share information with trusted third-party service providers, such as Backblaze for cloud storage and AWS for hosting services.
- For Legal Compliance: We may disclose information if required by law or in response to valid legal requests.
- In Business Transactions: If we are involved in a merger, acquisition, or sale of assets, your information may be transferred as part of that transaction.
- With Your Consent: We may share your information with third parties when you have provided explicit consent.
- Security of Your Information
- We implement reasonable administrative, technical, and physical safeguards to protect your personal information:
- Backblaze Security:
- Encryption: Files are encrypted on your computer using AES before transfer, sent over a secure SSL (HTTPS) connection, and stored encrypted in Backblaze's data centers.
- Private Encryption Key (PEK): Users can set a PEK for an additional layer of security. With a PEK, only you can decrypt your data; Backblaze cannot assist if the key is lost.
- Data Centers: Backblaze's facilities feature biometric security, ID checks, area locks requiring badge-level access, and are staffed 24/7/365. They are SSAE-18/SOC-2 compliant.
- Compliance: Backblaze's data centers have received SOC 2 Type 2 certification, ensuring adherence to industry standards for data security.
- AWS Security:
- Shared Responsibility Model: AWS secures the underlying infrastructure, while you manage the security of your instances, including operating systems, applications, and data.
- Network Isolation: Utilize Virtual Private Clouds (VPCs) to isolate resources, and configure security groups and Network ACLs to control traffic.
- Identity and Access Management (IAM): Implement IAM roles and policies to manage permissions and enforce the principle of least privilege.
- Data Encryption: Encrypt data at rest and in transit using AWS Key Management Service (KMS) and secure communication protocols like TLS.
- Monitoring and Logging: Enable services like AWS CloudTrail and Amazon CloudWatch to monitor activities and receive alerts for suspicious behavior.
- Database Encryption:
- All sensitive data in our database, including location and user information, is encrypted using symmetric encryption, specifically the Advanced Encryption Standard (AES) algorithm with a 256-bit key.
- However, no method of transmission over the internet or electronic storage is completely secure. We cannot guarantee the absolute security of your information.
- Your Rights and Choices
- Access and Correction: You may request access to your personal information or ask us to update or correct inaccuracies.
- Opt-Out: You can opt out of receiving promotional communications by following the unsubscribe instructions provided in those communications.
- Cookies: You can usually modify your browser settings to decline cookies, although this may affect your experience on the Site.
- Third-Party Links
- The Site may contain links to third-party websites. We are not responsible for the privacy practices or content of those websites. Please review their privacy policies before providing any information.
- Changes to This Privacy Policy
- We may update this Privacy Policy from time to time. Any changes will be effective immediately upon posting the revised policy on the Site. Your continued use of the Site after changes are posted constitutes your acceptance of the revised Privacy Policy.
By using the Site and associated services, you acknowledge that you have read, understood, and agreed to this Privacy Policy.