PRIVACY POLICY

The Zedex Solutions gathers the following information:

  1. Individuals willingly provide personal details like names, addresses, phone numbers, and email addresses. For instance, if you respond to a blog by our staff or ask us a question, we may collect this information to facilitate communication.
  2. When you contact us, we receive and store specific types of information. Similar to most websites, we utilize “cookies” for various purposes, such as tracking online activity and visitor information. You have the option to disable cookies in your browser.
  3. IP addresses.
  4. Details about the pages visited by individuals.
  5. Analytics data, including application types and versions, operating systems, screen adjustments, color depth, network locations, language, and time spent on the site.

The collected information serves several purposes:

  1. Internal review.
  2. Enhancement of our site’s content.
  3. Communication with users who voluntarily provide contact details and agree to receive updates from The Zedex Solutions about upcoming events and relevant information.

Currently, The Zedex Solutions does not sell or share personal information with third parties, and our partnerships are limited. We only send emails about updates when requested or when users subscribe to our services.

We reserve the right to use or disclose information as required by law, regulations, or lawful requests, to protect the site’s integrity or policies, prevent unauthorized use, or cooperate with law enforcement investigations or public safety inquiries. Additionally, we retain the right to share information with the next business entity in the event of a merger, product sale, or other company changes related to the site.

Secure Transmission Protocols:

  1. Encryption: All credit card transactions on our website are encrypted using industry-standard Secure Sockets Layer (SSL) technology. This encryption protocol ensures that all data transmitted between your browser and our servers remains confidential and protected from unauthorized access.

  2. Tokenization: We utilize tokenization methods to further enhance the security of credit card details. Instead of storing sensitive card information directly, a unique token is generated and used for processing transactions. This tokenized approach minimizes the risk of exposing sensitive data in the event of a security breach.

X
0
    0
    Your Cart
    Your cart is empty