SVECTOR LOGOSVECTOR
← Back to Home

Privacy Policy

SVECTOR

Last Updated: 2/5/2025

This Privacy Policy ("Policy") describes the policies and procedures of SVECTOR CORPORATION ("SVECTOR", "we", "our", or "us") pertaining to the collection, use, disclosure, and protection of your information when you use our artificial intelligence-powered software solutions, applications, platforms, and related services (collectively, the "Services"). This Policy is an integral part of our Terms of Service and is governed by the Technology Act, 2000, the Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011, and other applicable data protection laws of India.

1. Definitions and Interpretations

For the purposes of this Policy, the following terms shall have the following meanings:

  • "Artificial Intelligence Systems" refers to our machine learning models, neural networks, and other AI-powered technologies that process user data to provide our Services.
  • "Personal Data" means any information that can be used to identify a natural person, directly or indirectly, in particular by reference to an identifier such as a name, identification number, location data, online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that person.
  • "Sensitive Personal Data" includes passwords, financial information, health data, biometric information, genetic data, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, and data concerning a natural person's sex life or sexual orientation.
  • "Training Data" refers to data used to train our AI models, which may include anonymized user data and publicly available datasets.
  • "Model Outputs" means the results, predictions, recommendations, or other outputs generated by our AI systems based on user inputs.

2. Scope and Applicability

This Policy applies to:

  • All users of our Services, including individual users, corporate clients, and their authorized representatives
  • All data processing activities conducted through our AI-powered software solutions
  • All geographic locations where our Services are accessed, subject to local law variations
  • All forms of data collection, whether automated or manual
  • All third-party integrations and API connections

3. Legal Basis for Processing

We process your personal data on the following legal grounds:

  • Contractual Necessity: Processing necessary for the performance of a contract to which you are party or to take steps at your request prior to entering into a contract
  • Legal Obligation: Processing necessary for compliance with our legal obligations under applicable laws
  • Legitimate Interests: Processing necessary for our legitimate interests or those of third parties, except where such interests are overridden by your fundamental rights and freedoms
  • Consent: Processing based on your explicit consent, particularly for:
    • Processing of Sensitive Personal Data
    • Use of data for AI model training
    • Cross-border data transfers
    • Marketing communications

4. Data Collection and Processing

4.1 Categories of Personal Data

We collect and process the following categories of personal data:

  • Identity and Contact Information:
    • Full name and professional titles
    • Business email addresses and phone numbers
    • Company name and registration details
    • Physical business addresses
    • Government-issued identification numbers (where required by law)
  • Technical and Usage Data:
    • IP addresses and device identifiers
    • Browser type and operating system information
    • Access timestamps and session duration
    • API calls and request logs
    • Error reports and performance data
  • AI-Specific Data:
    • User inputs to AI systems
    • Model outputs and predictions
    • Training data contributions
    • Model performance metrics
    • Feedback and corrections provided to AI systems
  • Business and Transaction Data:
    • Contract details and service configurations
    • Payment and billing information
    • Usage statistics and subscription details
    • Service level agreements and compliance records

4.2 AI Model Training and Development

Regarding our AI systems and model training:

  • Data Use in AI Training:
    • We may use anonymized and aggregated user data to improve our AI models
    • Personal data is never used for training without explicit consent
    • Training data is segregated from production data
    • We maintain detailed records of data used in training
  • AI Model Governance:
    • Regular audits of AI model behavior and outputs
    • Bias detection and mitigation procedures
    • Version control and model lineage tracking
    • Performance monitoring and quality assurance

5. Technical and Organizational Security Measures

5.1 Data Security Infrastructure

We implement the following security measures:

  • Encryption and Access Controls:
    • AES-256 encryption for data at rest
    • TLS 1.3 for data in transit
    • Multi-factor authentication (MFA)
    • Role-based access control (RBAC)
    • Regular key rotation and certificate management
  • Network Security:
    • Web Application Firewalls (WAF)
    • DDoS protection
    • Regular penetration testing
    • Network segmentation and isolation
    • 24/7 security monitoring
  • Compliance and Certification:
    • ISO 27001:2013 certification
    • SOC 2 Type II compliance
    • GDPR compliance framework
    • Regular security audits

5.2 AI-Specific Security Measures

For our AI systems, we implement:

  • Model Security:
    • Adversarial attack detection and prevention
    • Model encryption and secure deployment
    • Secure model update mechanisms
    • Input validation and sanitization
  • Training Data Security:
    • Secure data labeling pipelines
    • Data poisoning detection
    • Privacy-preserving machine learning techniques
    • Federated learning where applicable

6. Data Processing Agreements

Our data processing commitments include:

  • Standard Contractual Clauses (SCCs) for international transfers
  • Data Processing Agreements (DPAs) with sub-processors
  • Joint Controller Agreements where applicable
  • Vendor assessment and compliance monitoring
  • Regular updates to reflect regulatory changes

7. Data Subject Rights

You have the following rights regarding your personal data:

  • Right to Access:
    • Obtain confirmation of processing
    • Access personal data we hold
    • Receive information about processing activities
    • Obtain copies of personal data
  • Right to Rectification:
    • Correct inaccurate personal data
    • Complete incomplete personal data
    • Update outdated information
  • Right to Erasure:
    • Request deletion of personal data
    • Remove data no longer necessary
    • Withdraw consent-based processing
  • AI-Specific Rights:
    • Explanation of AI-based decisions
    • Object to automated processing
    • Request human intervention
    • Contest AI-generated outputs

8. International Data Transfers

For cross-border data transfers, we ensure:

  • Legal Framework:
    • Adherence to Standard Contractual Clauses (SCCs)
    • Binding Corporate Rules where applicable
    • Adequacy decisions recognition
    • Data Transfer Impact Assessments
  • Technical Measures:
    • End-to-end encryption for transfers
    • Secure file transfer protocols
    • Data residency options
    • Transfer monitoring and logging

8. International Data Transfers (continued)

  • Compliance Documentation:
    • Transfer mechanism records
    • Sub-processor agreements
    • Compliance certifications
    • Audit trails and reports
  • 9. AI Ethics and Governance

    9.1 Ethical AI Principles

    Our AI development and deployment adheres to:

    • Fairness and Non-discrimination:
      • Regular bias assessment and mitigation
      • Fairness metrics monitoring
      • Diverse training data requirements
      • Equal access and treatment principles
    • Transparency and Explainability:
      • Model documentation requirements
      • Decision explanation mechanisms
      • Algorithmic impact assessments
      • Clear communication of AI capabilities and limitations
    • Human Oversight:
      • Human-in-the-loop processes
      • Override mechanisms
      • Regular human review of AI decisions
      • Escalation procedures

    9.2 AI Risk Management

    We implement the following risk management measures:

    • Risk Assessment:
      • Regular AI system audits
      • Impact assessments
      • Performance monitoring
      • Safety evaluation protocols
    • Quality Assurance:
      • Model validation procedures
      • Testing protocols
      • Performance benchmarks
      • Continuous monitoring systems

    10. Incident Response and Breach Notification

    10.1 Incident Management

    Our incident response procedures include:

    • Detection and Classification:
      • 24/7 monitoring systems
      • Automated alert mechanisms
      • Incident severity classification
      • Initial impact assessment
    • Response and Mitigation:
      • Incident response team activation
      • Containment procedures
      • Evidence preservation
      • System recovery protocols

    10.2 Breach Notification

    In the event of a data breach, we will:

    • Notification Procedures:
      • Notify affected individuals within 72 hours
      • Report to relevant authorities as required
      • Provide detailed incident reports
      • Maintain communication channels for updates
    • Remediation:
      • Implement corrective measures
      • Conduct post-incident analysis
      • Update security protocols
      • Enhance monitoring systems

    11. Regulatory Compliance

    11.1 Compliance Framework

    We maintain compliance with:

    • Indian Laws and Regulations:
      • Information Technology Act, 2000
      • Personal Data Protection Bill
      • IT Rules, 2011
      • Cyber Security Guidelines
    • International Standards:
      • ISO 27001:2013
      • SOC 2 Type II
      • GDPR (where applicable)
      • CCPA (where applicable)

    11.2 Documentation and Records

    We maintain the following records:

    • Processing activities records
    • Data protection impact assessments
    • Consent records and withdrawals
    • Data subject request logs
    • Security incident reports
    • Audit trails and compliance reports

    12. Changes to Privacy Policy

    We reserve the right to modify this Privacy Policy at any time. Material changes will be communicated through:

    • Notice Requirements:
      • Email notifications to registered users
      • Prominent website announcements
      • In-app notifications
      • Service dashboard alerts
    • Version Control:
      • Policy version tracking
      • Change log maintenance
      • Archive of previous versions
      • Comparison tools for changes

    13. Contact Information

    For privacy-related inquiries and requests:

    Data Protection Officer
    SVECTOR
    Email: legal@svector.co.in
    Ahmedabad, Gujarat, India

    Response Times

    We commit to the following response times for privacy-related requests:

    • General inquiries: Within 2 business days
    • Data subject access requests: Within 30 days
    • Breach notifications: Within 72 hours
    • Regulatory inquiries: As per statutory requirements

    © 2025 SVECTOR. All rights reserved.