Skip to main content

Privacy Policy

TKEY is committed to protecting your privacy. Please read our Privacy Policy to understand how we collect, use, disclose, transfer and store your data. Find out how to check the data that may be associating with you, for what purposes we use it, and how you can change, export, or delete it.

Using the services and services of the Website: https://tkey.org/ and all relevant subdomains associated with the Site https://tkey.org/ (referred to as the “Site,” “website,” “sites,”) you (referred to as the “User”) agree to the data use rules described in this Privacy Policy and entrust us with your personal information. We TKEY DMCC (referred to as “Company,” “TKEY,” “We”) do everything to ensure their security and at the same time provide you with the ability to manage your data.

This Policy does not apply to collected data, or information, through offline channels and to any other websites that are our partners or third parties, regardless of the communication channel, including any content or services, including advertising, that link to the Website.

Must read our Privacy Policy in conjunction with any other legal notices or terms available on other pages of our Website.

I. Operators of personal data

1.1. TKEY company

1.1.1. TKEY is the supplier of integrated technological solutions for financial and industrial institutions.

1.1.2. Considering the Company’s activities, the range of information collected and processed by TKEY is significantly lower than that of other market representatives, for example, financial institutions that need more information to provide services.

1.2. Third-party personal data operators

1.2.1. Please note that the TKEY Company uses various system providers to carry out its activities, including systems for business management and customer service solutions—this means that in some cases, we will only have access to the information transmitted by you. However, the corresponding personal data operator will be responsible for its storage and processing; in such cases, we will notify you, for example, on such a page, there will be a link to the supplier’s Privacy Policy so that you can read it.

1.2.2. Thus, if the Company processes data using applications (business management or customer service systems), for example, processes information about its customers or employees, we entrust the Company to the supplier of such a system with this data for processing, and they, in turn, protect it, restrict access and process them only per our instructions and the law.

1.2.3. Regardless of the operator of personal data, you can manage your data, including requesting their deletion through our Company, at the same time, on the pages of the Site, where there will be a policy of the operator acting on our behalf and our behalf, you can send them a request directly or contact us. Read the information in section “VIII. How to exercise your right.”

II. Collection and use of personal data (information)

2.1. Information when filling out a web form related to ordering a service or partnership

a) your name; b) your email; c) your address (business and personal); d) the numbers of your landline and mobile phones (business and personal); e) your geographic location (country/territory where you live and, or work); f) your title, title, and the name of your employer; g) the industry in which you work; h) country or countries, industry sector(s), and area(s) of your services for which you want to receive communications (if you have registered on our user portals); i) any other information you choose to provide us when filling out the contact form on our Website.

In particular, the listed information is requesting when requesting services for corporate clients who want to use the services of TKEY and provide a better user experience; we need this data to find solutions for you.

2.2. Information when filling out the webform to the support service

2.2.1. If you contact TKEY customer support via web forms or email, any personal data you share with us will only be stored to investigate the issue and feedback you upon your request.

2.2.2. In some cases, when you or any other user sends an email or contacts us in another way, the Company may gain access to your data if containing in the message; this also includes third parties: external data providers or our business partners.

2.3. Information when using the Site

2.3.1. When using the TKEY Site, we also track and collect information about the use of the Site, such as date and time of access, device identification, operating system, browser type, and IP address. This information can obtain directly from the Site or through third-party services. This service usage data helps us ensure that our interface is accessible to users across all platforms and assist in criminal investigations.

2.3.2. When you use our products and services, we may use standard practices to place data files, called cookies, flash cookies, pixel tags, or other tracking tools, on your computer or other devices when you connect to the Site.

2.3.3. We use cookies to help us recognize you as a customer; this may allow us to collect information about your use of our products and services, improve their customization and content for you, and collect information about your computer or other access devices.

Please see our Cookie Policy for more information on cookies and related technologies.

III. How and for what we use your personal information

3.1. Business purposes and request processing

3.1.1. We may collect Personal Information from you that you choose to provide when you fill out forms on our Website, including the information specified in clause 2.1. We may use this personal information to respond to your requests and provide the requested services and, or information.

3.1.2. We may also use your personal information for our business purposes, such as:

  • Recordkeeping, statistical analysis, internal reporting, and research purposes.
  • To ensure network and information security.
  • To notify you of changes to our services.
  • To investigate any complaint you make.
  • To provide evidence of any dispute or pending dispute between you and us.
  • To customize various aspects of our Website to improve your experience.
  • To detect and prevent fraud and other criminal offenses and to manage risks.
  • A Disaster recovery.
  • A Storing documents.
  • Database management.
  • To protect the rights, property, and, or safety of TKEY, its personnel, and others.
  • To ensure the quality of the services we provide to our users.

3.2. To provide our services and analytics

3.2.1. We use the information we collect to provide our services and to verify your identity. The IP address and unique identifier stored in your device’s cookies are uses to help us to verify your identity and provide our service. Given our legal obligations and system requirements, we cannot provide you with services without data such as identification and contact information using some of the Company’s services.

3.2.2. We actively analyze data to understand how our services are using. This review is performed by our operations team to continually improve the performance of our services and resolve user interface issues. We constantly monitor information about the activities of our systems and communicate with users to find and quickly fix problems.

3.2.3. Our website pages and emails may contain web beacons, pixel tags, or any other similar type of data analysis tool. They allow us to track the receipt of correspondence and count the number of users who have visited our Website. We may combine your personal information with the personal data of our other customers on an anonymous basis (removing your identifiers) so that careful statistical analysis of common patterns can lead us to provide quality products and services. If your personal information is anonymous, we do not need a legal basis as this information will no longer constitute personal information. Unless personal information is present in an anonymous form, it is our legitimate interest to continually evaluate that personal data to ensure that the products and services provided are appropriate for the market.

3.3. To protect our users

3.3.1. We use the information we collect to protect our Site, user accounts, and archives. IP addresses and cookies are uses to protect against automatic abuse such as spam, phishing, and distributed denial of service (DDoS). The data is analyzing for early detection of suspicious user behavior and prevention of potential fraud.

3.4. To comply with legal and regulatory requirements

3.4.1. The privacy and security of the data you provide are essential to comply with regulations, government requests, and user requests. We will not disclose or provide personal data to third parties without our legal team’s review or prior consent.

3.5. To communicate with users

3.5.1. We use personal information, such as an email address, to communicate directly with users when providing customer support. Without processing your personal information and confirming each message, we will not respond to your requests.

3.6. To ensure compliance with our terms of use and other agreements

3.6.1. We continuously monitor, investigate and prevent any potentially prohibited or illegal activity that violates our terms of service. In the best interest of our entire user base, we closely monitor our compliance with our third-party agreements and actively investigate violations of our published terms of use. TKEY reserves the right to terminate the services to any user who engages in activities that violate our Agreements posted on the Site.

3.7. Marketing Messages

3.7.1. We may use your personal information to send you marketing communications by email or in other agreed forms (including Social Media Communities) to keep you updated on our latest products and services. We send you marketing communications, will do so based on your consent and registered marketing preferences.

3.8. Other goals

3.8.1. We may use your Personal Information for additional specific purposes is indicating at the time of collection on certain pages of our Website.

3.8.2. If you choose not to provide the Personal Information we have requested, we may not be able to provide you with the information and, or services you have requested or otherwise fulfill the purposes for which we have requested Personal Information. In addition, your visit to our Website will remain unchanged.

IV. Security

4.1. How we protect user data

4.1.1. TKEY has implemented several security measures to ensure that your information is not lost or altered. Our security measures include, but are not limited to the PCI Scanning (PCI DSS), Secure Socket Layer (SSL) encryption technology, pseudonymization, internal data access restrictions, and tight controls on physical access to buildings and files, and DDoS protection.

4.1.2. Please note: 100% secure data transmission over the Internet or electronic storage cannot guarantee. We ask you to understand your responsibility to take independent security measures to protect your personal information.

4.2. Safety of data processing operators

4.2.1. In cases where the Company instructs another operator to store personal data, the relevant operator is responsible for the security of such data, which exercises control over them. Business management systems and systems for processing customer requests, which providers of such services provide, store confidential company data, and therefore the choice of such operators is a responsible task for us.

4.2.2. We do not sell, rent, distribute, or otherwise make personal information commercially available to third parties, except that we may share information with our service providers for the purposes set out in this Privacy Policy.

V. Third-Party Sites

5.1. Social network

5.1.1. The Site may contain links to social networks and other integrated tools. We may provide users with access to reviews, forums, and other user-generated content. Any information disclosed in this way is publicly available. Care should are taking when deciding whether to disclose your personal information in such a context. We are not responsible for the security practices of other users (including web operators) to whom you provide information. Please read the organizations’ Privacy Policy providing these functions for more information about the purpose and scope of data collection and processing of such data by such.

5.2. Third-party sites

5.2.1. The TKEY website may contain links to other third-party websites that may collect personal information about you, including through the use of cookies or other technologies. If you follow a link to another site, you will leave the TKEY site, and this Privacy Policy will not apply to your actions and actions on other sites. Please read the privacy policies of other websites as we do not control them and are not responsible for any information that has been transmitted or received by a third party.

6.1. Your consent

6.1.1. We rely on your consent to process your personal information to marketing and event information that we may send you. In other cases, we process your personal information where necessary: a) to comply with our legal and regulatory obligations; for our legitimate interests, in particular by answering your questions, providing you with services or information; b) for our internal business purposes specified in section III of this Policy.

6.2. Information from other sources

6.2.1. If permissible under applicable local laws, we may combine information that you have provided to us with other information that we already have about you and that we have collected for compatible purposes.

In certain circumstances, you have rights under data protection laws concerning your data, which are described in more detail below:

7.1. Right to access: the right to request copies of your data from us.

7.2. Right to correct: the right to have your data rectified if it is inaccurate or incomplete.

7.3. Right to erase: the right to request that we delete your data from our systems.

7.4. Right to restrict our use of your information: the right to prohibit us from using your data or limit how we can use it.

7.5. Right to data portability: the right to request that we move, copy or transfer your data.

7.6. Right to object: the right to object to our use of your data, including where we use it for our legitimate interests.

VIII. How to exercise your rights

8.1. Send a request to the legal department

8.1.1. Put your request in writing to the email address [email protected] In the requesting legal, specify enough information to identify you. For example, if you want to make corrections, please indicate in your request what information is incorrect and what you want to replace it.

8.1.2. We may need to request specific information from you to help us verify your identity and ensure your rights to access your data (or exercise any of your other rights); this is a security measure to ensure that personal data will not share with anyone who is not entitled to receive it. We may also contact you to request additional information regarding your request to expedite our response.

IX. Final provisions

9.1. Please inform us if your data changes during your relationship with us.

9.2. If you have legal questions or suggestions for improving this Privacy Policy, please send them to [email protected]

TKEY DMCC, United Arab Emirates

Page last updated: 01 September 2021