You acknowledge that you have read, understand, accept and agree to be bound by the terms and conditions that set forth your use of www.logicastech.com accessing this website and the materials and information contained
What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, mailing address, phone number or other details to help you with your experience.
When do we collect information?
Usually Logicas Tech® collects client’s information via two ways
➙ User Provide Data
➙ Expertise Research
User Provided Data
User provided Data is based on such information which user/client provides via emails, phone calls, web forms or through personal communication.
The other way we use to collect information of user/client data is through expertise research. Our experts make an internal search to collect client’s data if in case we don’t get it directly from the client.
We collect information from you when you place an order, subscribe to a newsletter, fill out a form, Use Live Chat, Open a Support Ticket or enter information on our site.
Use of Client’s Information & our Security Criteria
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
➙To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
➙To improve our website in order to better serve you.
➙To allow us to better service you in responding to your customer service requests.
➙To administer a contest, promotion, survey or other site feature.
➙To quickly process your transactions.
➙To ask for ratings and reviews of services or products
➙To follow up with them after correspondence (live chat, email or phone inquiries)
How do we protect your information?
We do not use vulnerability scanning and/or scanning to PCI standards.
An external PCI compliant payment gateway handles all CC transactions.
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use ‘cookies’?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.
We do not include or offer third-party products or services on our website.
We do not use Google AdSense Advertising on our website.
We have implemented the following by Google:
We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with impressions and other service functions as they relate to our website.
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt-Out page or by using the Google Analytics Opt-Out Browser Add-on.
We may use that information for marketing and upselling purpose.
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
➙Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
➙ Send information, respond to inquiries, and/or other requests or questions.
➙ Process orders and to send information and updates pertaining to orders.
➙ Send you additional information related to your product and/or service.
➙ Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.
To be in accordance with CAN-SPAM, we agree to the following:
➙ Not use false or misleading subjects or email addresses.
➙ Identify the message as an advertisement in some reasonable way.
➙ Include the physical address of our business or site headquarters.
➙ Monitor third-party email marketing services for compliance, if one is used.
➙ Honor opt-out/unsubscribe requests quickly.
➙ Allow users to unsubscribe by using the information at the bottom of each email.
How does your site handle “Do Not Track” signals?
We do not honor Do Not Track (DNT) signals because we may use that information for marketing and upselling purpose.
We Process Personal Data in Lawful, fair & Transparent Manner.
The company are expected to limit the processing, collect only that data from you which is necessary, and not keep personal data once the processing purpose is completed.
When the company has the intent to process personal data beyond the legitimate purpose for which that data was collected, a clear and explicit consent must be asked from the data subject.
Privacy by Design
We would incorporate organizational and technical mechanisms to protect personal data in the design of new systems and processes; that is, privacy and protection aspects should be ensured by default.
Data Protection Impact Assessment
To estimate the impact of changes or new actions, a Data Protection Impact Assessment should be conducted when initiating a new project, change, or product. The Data Protection Impact Assessment is a procedure that needs to be carried out when a significant change is introduced in the processing of personal data. This change could be a new process or a change to an existing process that alters the way personal data is being processed.
The controller of personal data in Logicas Tech has the accountability to ensure that personal data is protected and GDPR requirements respected, even if processing is being done by a third party. This means controllers have the obligation to ensure the protection and privacy of personal data when that data is being transferred outside the company, to a third party and/or other entity within the company.
Awareness and training
Our Organization created awareness among employees about key GDPR requirements, and conduct regular trainings to ensure that employees remain aware of their responsibilities with regard to the protection of personal data and identification of personal data breaches.
Compliance with Law OR Any Disputes
By accessing the site, you acknowledge and confirm that the Site, its Service(s), any underlying technology used in connection therewith, and all software, material, information, communications, text, graphics, links, electronic art, animations, audio, video, photos, and other data (collectively, the “Content”) available on the Site are protected by the Copyright laws. User may not allow copying, reproduce, publish, distribute, modify, create derivative works of, rent, lease, sell, transfer, display, transmit, compile or collect in a database, or in any manner commercially exploit any part of the Content or the Services, in whole or in part unless permitted. The User may not store any of the Content or the Services in any form.
367, Block N Phase 2
Johar Town, Lahore
+92 321 2378889