- I. Operators of personal data
- II. Collection and use of personal data (information)
- III. How and for what we use your personal information
- IV. Security
- V. Third-Party Sites
- VI. Legal basis for the collection and use of Personal Information
- VII. Your legal right
- VIII. How to exercise your rights
- IX. Final provisions
This Policy does not apply to collected data, or information, through offline channels and to any other websites that are our partners or third parties, regardless of the communication channel, including any content or services, including advertising, that link to the Website.
1.1. TKEY company
1.1.1. TKEY is the supplier of integrated technological solutions for financial and industrial institutions.
1.1.2. Considering the Company’s activities, the range of information collected and processed by TKEY is significantly lower than that of other market representatives, for example, financial institutions that need more information to provide services.
1.2. Third-party personal data operators
1.2.2. Thus, if the Company processes data using applications (business management or customer service systems), for example, processes information about its customers or employees, we entrust the Company to the supplier of such a system with this data for processing, and they, in turn, protect it, restrict access and process them only per our instructions and the law.
1.2.3. Regardless of the operator of personal data, you can manage your data, including requesting their deletion through our Company, at the same time, on the pages of the Site, where there will be a policy of the operator acting on our behalf and our behalf, you can send them a request directly or contact us. Read the information in section “VIII. How to exercise your right.”
2.1. Information when filling out a web form related to ordering a service or partnership
a) your name; b) your email; c) your address (business and personal); d) the numbers of your landline and mobile phones (business and personal); e) your geographic location (country/territory where you live and, or work); f) your title, title, and the name of your employer; g) the industry in which you work; h) country or countries, industry sector(s), and area(s) of your services for which you want to receive communications (if you have registered on our user portals); i) any other information you choose to provide us when filling out the contact form on our Website.
In particular, the listed information is requesting when requesting services for corporate clients who want to use the services of TKEY and provide a better user experience; we need this data to find solutions for you.
2.2. Information when filling out the webform to the support service
2.2.1. If you contact TKEY customer support via web forms or email, any personal data you share with us will only be stored to investigate the issue and feedback you upon your request.
2.2.2. In some cases, when you or any other user sends an email or contacts us in another way, the Company may gain access to your data if containing in the message; this also includes third parties: external data providers or our business partners.
2.3. Information when using the Site
2.3.1. When using the TKEY Site, we also track and collect information about the use of the Site, such as date and time of access, device identification, operating system, browser type, and IP address. This information can obtain directly from the Site or through third-party services. This service usage data helps us ensure that our interface is accessible to users across all platforms and assist in criminal investigations.
2.3.2. When you use our products and services, we may use standard practices to place data files, called cookies, flash cookies, pixel tags, or other tracking tools, on your computer or other devices when you connect to the Site.
3.1. Business purposes and request processing
3.1.1. We may collect Personal Information from you that you choose to provide when you fill out forms on our Website, including the information specified in clause 2.1. We may use this personal information to respond to your requests and provide the requested services and, or information.
3.1.2. We may also use your personal information for our business purposes, such as:
- Recordkeeping, statistical analysis, internal reporting, and research purposes.
- To ensure network and information security.
- To notify you of changes to our services.
- To investigate any complaint you make.
- To provide evidence of any dispute or pending dispute between you and us.
- To customize various aspects of our Website to improve your experience.
- To detect and prevent fraud and other criminal offenses and to manage risks.
- A Disaster recovery.
- A Storing documents.
- Database management.
- To protect the rights, property, and, or safety of TKEY, its personnel, and others.
- To ensure the quality of the services we provide to our users.
3.2. To provide our services and analytics
3.2.1. We use the information we collect to provide our services and to verify your identity. The IP address and unique identifier stored in your device’s cookies are uses to help us to verify your identity and provide our service. Given our legal obligations and system requirements, we cannot provide you with services without data such as identification and contact information using some of the Company’s services.
3.2.2. We actively analyze data to understand how our services are using. This review is performed by our operations team to continually improve the performance of our services and resolve user interface issues. We constantly monitor information about the activities of our systems and communicate with users to find and quickly fix problems.
3.2.3. Our website pages and emails may contain web beacons, pixel tags, or any other similar type of data analysis tool. They allow us to track the receipt of correspondence and count the number of users who have visited our Website. We may combine your personal information with the personal data of our other customers on an anonymous basis (removing your identifiers) so that careful statistical analysis of common patterns can lead us to provide quality products and services. If your personal information is anonymous, we do not need a legal basis as this information will no longer constitute personal information. Unless personal information is present in an anonymous form, it is our legitimate interest to continually evaluate that personal data to ensure that the products and services provided are appropriate for the market.
3.3. To protect our users
3.3.1. We use the information we collect to protect our Site, user accounts, and archives. IP addresses and cookies are uses to protect against automatic abuse such as spam, phishing, and distributed denial of service (DDoS). The data is analyzing for early detection of suspicious user behavior and prevention of potential fraud.
3.4. To comply with legal and regulatory requirements
3.4.1. The privacy and security of the data you provide are essential to comply with regulations, government requests, and user requests. We will not disclose or provide personal data to third parties without our legal team’s review or prior consent.
3.5. To communicate with users
3.5.1. We use personal information, such as an email address, to communicate directly with users when providing customer support. Without processing your personal information and confirming each message, we will not respond to your requests.
3.7. Marketing Messages
3.7.1. We may use your personal information to send you marketing communications by email or in other agreed forms (including Social Media Communities) to keep you updated on our latest products and services. We send you marketing communications, will do so based on your consent and registered marketing preferences.
3.8. Other goals
3.8.1. We may use your Personal Information for additional specific purposes is indicating at the time of collection on certain pages of our Website.
3.8.2. If you choose not to provide the Personal Information we have requested, we may not be able to provide you with the information and, or services you have requested or otherwise fulfill the purposes for which we have requested Personal Information. In addition, your visit to our Website will remain unchanged.
4.1. How we protect user data
4.1.1. TKEY has implemented several security measures to ensure that your information is not lost or altered. Our security measures include, but are not limited to the PCI Scanning (PCI DSS), Secure Socket Layer (SSL) encryption technology, pseudonymization, internal data access restrictions, and tight controls on physical access to buildings and files, and DDoS protection.
4.1.2. Please note: 100% secure data transmission over the Internet or electronic storage cannot guarantee. We ask you to understand your responsibility to take independent security measures to protect your personal information.
4.2. Safety of data processing operators
4.2.1. In cases where the Company instructs another operator to store personal data, the relevant operator is responsible for the security of such data, which exercises control over them. Business management systems and systems for processing customer requests, which providers of such services provide, store confidential company data, and therefore the choice of such operators is a responsible task for us.
5.1. Social network
5.2. Third-party sites
6.1. Your consent
6.1.1. We rely on your consent to process your personal information to marketing and event information that we may send you. In other cases, we process your personal information where necessary: a) to comply with our legal and regulatory obligations; for our legitimate interests, in particular by answering your questions, providing you with services or information; b) for our internal business purposes specified in section III of this Policy.
6.2. Information from other sources
6.2.1. If permissible under applicable local laws, we may combine information that you have provided to us with other information that we already have about you and that we have collected for compatible purposes.
In certain circumstances, you have rights under data protection laws concerning your data, which are described in more detail below:
7.1. Right to access: the right to request copies of your data from us.
7.2. Right to correct: the right to have your data rectified if it is inaccurate or incomplete.
7.3. Right to erase: the right to request that we delete your data from our systems.
7.4. Right to restrict our use of your information: the right to prohibit us from using your data or limit how we can use it.
7.5. Right to data portability: the right to request that we move, copy or transfer your data.
7.6. Right to object: the right to object to our use of your data, including where we use it for our legitimate interests.
8.1. Send a request to the legal department
8.1.1. Put your request in writing to the email address [email protected] In the requesting legal, specify enough information to identify you. For example, if you want to make corrections, please indicate in your request what information is incorrect and what you want to replace it.
8.1.2. We may need to request specific information from you to help us verify your identity and ensure your rights to access your data (or exercise any of your other rights); this is a security measure to ensure that personal data will not share with anyone who is not entitled to receive it. We may also contact you to request additional information regarding your request to expedite our response.
9.1. Please inform us if your data changes during your relationship with us.
TKEY DMCC, United Arab Emirates