top of page

Privacy Policy

A legal disclaimer

CryptIndo Labs Pvt Ltd (“we”, “our”, “us”) is committed to protecting the privacy, security, and confidentiality of information collected from visitors, clients, partners, and users interacting with our website and digital services. As a research-driven cybersecurity organisation, we understand the importance of responsible data practices and the trust you place in us.

This Privacy Policy explains how we collect, use, process, share, and safeguard information in connection with our website, research initiatives, consulting services, and communication channels.

1. Information We Collect

We may collect the following categories of information when you visit our website or engage with our services:

a. Information You Provide
   •    Contact details (name, email address, phone number, organisation)
   •    Messages or enquiries submitted through forms
   •    Information shared while requesting demos, consultations, or training programs
   •    Job application details, if applying for roles with us

b. Automatically Collected Information
 

When you browse our website, we may collect:
   •    IP address
   •    Browser type and device information
   •    Access times and referring URLs
   •    Pages viewed and interaction patterns
   •    Cookies or similar tracking technologies (for analytics and site functionality)

c. Information from Third Parties

We may receive limited information such as verification details or professional references when onboarding clients, partners, or employees, where applicable.
 

2. How We Use Your Information

We use collected information to support and improve our research, services, and engagement:
   •    Responding to enquiries or service requests
   •    Providing updates about our products, research, or training programs
   •    Improving website performance, security, and user experience
   •    Conducting internal analytics and operational assessments
   •    Facilitating business development and client engagement
   •    Ensuring compliance with legal, regulatory, and contractual obligations
   •    Processing job applications or vendor partnerships
   •    Safeguarding our infrastructure from cyber threats

We do not use collected information for profiling, selling data, or unrelated marketing without your consent.

3. Sharing of Information

We may share information under the following circumstances:
   •    With trusted service providers who support hosting, analytics, or communication workflows, under strict confidentiality.
   •    With government or regulatory authorities, where legally required.
   •    With research or defence partners, only when relevant and authorised for collaborative work.
   •    During corporate transactions, such as mergers or acquisitions, subject to legal safeguards.

We do not sell, rent, or trade personal information to third parties.

4. Data Security

As a cybersecurity organisation, we prioritise strong security practices. We implement:
   •    Encrypted communication mechanisms
   •    Secure server and infrastructure management
   •    Access-controlled environments
   •    Regular security audits
   •    Advanced cryptographic systems and best-practice protocols

While no system is completely immune to threats, we continuously evolve our safeguards to mitigate risks.

5. Cookies and Tracking Technologies

Our website may use cookies or analytics tools to improve performance and understand user behaviour.
You may disable cookies through your browser settings, though some features may function differently.

6. Your Rights

Depending on your jurisdiction, you may have the right to:
   •    Access the information we hold about you
   •    Request corrections or updates
   •    Request deletion of your information, where legally permissible
   •    Withdraw consent for communication
   •    Ask how your data is used or processed

Requests can be submitted to the contact details provided below.

7. Data Retention

We retain information only for as long as necessary for operational, legal, or security-related purposes.
Retention periods may vary depending on the type of engagement or regulatory requirementsespecially in defence and cryptographic research contexts.

8. External Links

Our website may contain links to external websites. We are not responsible for their privacy practices, content, or security standards.

9. Updates to This Policy

We may update this Privacy Policy periodically to reflect enhancements in our services, research practices, or legal requirements.
The most recent version will always be available on this page.

bottom of page