IG Square Pakistan (Pvt.) Limited Privacy Policy
This Privacy Policy outlines how we collect, use, share and protect your personal information when you use our services, including our websites “https://ig-square.com/”, application, software and marketing services. By using our services, you consent to the practices outlined in this policy. Protecting your privacy is important to us.
In this privacy policy, references, “IG Square”, “us”, “we” or “our”, are all references to IG Square.
If you have any queries or concerns about any aspect of this policy or how IG Square handles your information, please email us at info@ig-square.com.
Information We Collect.
We collect personal information from you in various ways. In this section we have elaborated different ways of how we collect your personal information from you and the ways in which that information will be used.
Contact Information:
Demographic Information:
Website Usage Information:
Marketing and Communication Data:
Client Data:
Updates on developments and initiatives:
How we use your information.
We use the information we collect from you;
Do we share your information with third parties?
We collect personal information from you in various ways. In this section we have elaborated different ways of how we collect your personal information from you and the ways in which that information will be used.
Service Providers :
Legal Compliance:
How long do we keep your information?
We only keep your personal information as long as we need to, to be able to use it for the reasons given in this Privacy Policy and for as long as it is required by the law.
Children’s Privacy:
Your rights:
You have information-related rights, including the right to:
To exercise these rights or to inquire about your data, please contact us using the information provided in the Contact Information section below.
Data Security:
We take the security of your personal information seriously and employ appropriate measures to protect it from unauthorized access or disclosure.
Measures We take to ensure Applications Data Security.
We take several important measures to ensure the security of application data. Here’s an overview of the key steps and practices we employ to protect application data;
Secure Development Practices:
IG Square employs secure coding practices during the development of applications. This includes input validation, output encoding and protection against common vulnerabilities like injection attacks, e.g., SQL injection or XSS.
Code Reviews:
Regular code reviews are conducted to identify and rectify security vulnerabilities, code weaknesses and potential risks in the applications’ codebase.
Authentication and Authorization:
Strong authentication and authorization mechanisms are implemented to ensure that only authorized users can access the application and its data. This includes using multi-factor authentication (MFA) when necessary.
Access Control:
Role-based access control (RBAC) is used to restrict access to sensitive data and application features. Access permissions are granted based on user roles and responsibilities.
Error Handling:
Error handling is implemented to handle exceptions gracefully, without exposing sensitive information in error messages that could be exploited by attackers
Content Security Policy (CSP):
A Content Security Policy is employed to control the sources of content that can be loaded by the application, mitigating the risks of XSS attacks.
Regular updates:
All application components, including libraries and dependencies, are kept up-to-date with the latest security patches to fix known vulnerabilities.
Data Backup and Recovery:
Data is regularly backed up and the restoration process is tested to ensure data can be recovered in the event of data loss.
Third-Party Libraries and Components:
We at IG Square, assesses the security of third-party libraries and components used in applications and ensures they are kept up-to-date.
Secure Communication:
Secure communication protocols and encryption are used for data transmission within the application and between the application and clients.
Regular Security Training:
The development team receives regular security training to stay informed about the latest security threats and best practices
Vendor Security Assessment:
The security measures of third-party vendors and services integrated into the applications are assessed.
Documentation and Security Policies:
Security practices and policies are documented and made available to the development team, ensuring that all developers adhere to these policies
Cookies.
We use cookies and tracking technologies to enhance your browsing experience. You can manage your cookie preferences through your browser settings.
What are Cookies?
There are various types of cookies;
Cookies play a crucial role in enhancing user experience on the internet, but concerns about privacy and data security have led to increased scrutiny and regulatory measures in some regions. Users can often manage and control cookie preferences through their browser settings, allowing them to accept, reject or delete cookies. By deleting our cookies or disabling future cookies you may not be able to access certain areas or features of our website.
Changes to this Privacy Policy.
We reserve the right to revise this privacy policy at any time to ensure that it is up-to-date. Significant changes will be communicated through our website or other channels. You are advised to review this Privacy Policy periodically for any changes.
Contact Information.
If you have any queries, concerns or requests about how we use your personal information, please let us know by contacting us at: