Policy & Disclaimer

WEB SITE TERMS AND CONDITIONS OF USE
1. Terms

Upon accessing this website, you are consenting to abide by the Terms and Conditions of Use outlined herein, as well as all pertinent laws and regulations. You acknowledge your responsibility for complying with any applicable local laws. If you disagree with any of these terms, you are prohibited from utilizing or accessing this site. The materials featured on this website are safeguarded by relevant copyright and trademark laws.

2. Use License

1. You are granted permission to temporarily download a single copy of the materials (information or software) from SunarTech’s website for personal, non-commercial, transitory viewing only. This constitutes a license and not a transfer of title. Under this license, you are not allowed to:

  1. Modify or copy the materials.
  2. Use the materials for any commercial purpose, or for any public display (commercial or non-commercial).
  3. Attempt to decompile or reverse engineer any software contained on SunarTech’s website.
  4. Remove any copyright or other proprietary notations from the materials.
  5. Transfer the materials to another person or “mirror” the materials on any other server.

2. This license will automatically terminate if you violate any of these restrictions and may be terminated by SunarTech at any time. Upon termination of your viewing of these materials or the termination of this license, you must destroy any downloaded materials in your possession, whether in electronic or printed format.

3. Disclaimer

The materials on SunarTech’s website are provided “as is.” SunarTech makes no warranties, whether expressed or implied, and hereby disclaims and negates all other warranties, including but not limited to implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Additionally, SunarTech does not warrant or make any representations regarding the accuracy, probable outcomes, or reliability of the use of the materials on its Internet website or otherwise relating to such materials or on any sites linked to this site.

4. Limitations

SunarTech and its suppliers shall not be liable for any damages, including but not limited to loss of data or profit, or due to business interruption, arising out of the use or inability to use the materials on SunarTech’s Internet site. This holds true even if SunarTech or a SunarTech authorized representative has been notified orally or in writing about the possibility of such damage. As certain jurisdictions do not permit limitations on implied warranties or liability for consequential or incidental damages, these limitations may not apply to you.

5. Revisions and Errata

The materials presented on SunarTech’s website may contain technical, typographical, or photographic errors. SunarTech does not guarantee the accuracy, completeness, or currentness of any materials on its website. SunarTech reserves the right to make changes to the materials on its website at any time without prior notice. However, SunarTech does not commit to updating the materials.

6. Links

SunarTech has not reviewed all the sites linked to its Internet website and is not responsible for the content of any such linked site. The inclusion of any link does not imply endorsement by SunarTech of the site. The use of any linked website is at the user’s own risk.

7. Site Terms of Use Modifications

SunarTech reserves the right to revise these terms of use for its website at any time without notice. Your use of this website constitutes an agreement to be bound by the most recent version of these Terms and Conditions of Use.

8. Governing Law

Any claim related to SunarTech’s website shall be governed by the laws of the Government of India, irrespective of its conflict of law provisions.

General Terms and Conditions applicable to Use of a Web Site.
PRIVACY POLICY

Ensuring your privacy is of utmost importance to us. Therefore, we have formulated this policy to provide you with a clear understanding of how we collect, use, communicate, and disclose personal information. The following outlines our privacy policy:

  • Before or at the time of collecting personal information, we will specify the purposes for which the information is being collected.
  • We will collect and use personal information solely with the aim of fulfilling the purposes specified by us and for other compatible purposes unless we obtain the consent of the individual concerned or as required by law.

We are dedicated to conducting our business in line with these principles to ensure the protection and maintenance of the confidentiality of personal information.

SECURITY POLICY
SECURITY POLICY

Confidentiality

Strict enforcement of access controls is implemented for all employees within the application. Access to specific users is granted based on their assigned role, aligned with business requirements. Only authorized employees are permitted to access customer systems following the onboarding process for customer projects, subject to subsequent approval from the customer. User accounts are continuously monitored and undergo periodic reviews.

All employees and contract personnel are obligated to adhere to our InfoSec Policies, particularly in safeguarding sensitive, confidential, and organizational data.

Personnel Practices

As a standard part of the hiring process, SunarTech conducts background verification for all employees. Upon onboarding, every employee undergoes ISMS Security awareness training, as well as training on Privacy & Confidentiality, Ethics, and Compliance. These training sessions are not only provided during the onboarding process but also on a periodic basis for continuous reinforcement.

To emphasize the commitment to security, availability, and confidentiality, all employees are obligated to read and sign a Non-disclosure Agreement. This agreement serves as a formal commitment to uphold and protect SunarTech’s security standards.

Network Protection

The Network Firewall has been configured in accordance with industry best practices. It is set to “deny” traffic that does not correspond to internal requests. The firewall is configured to provide protection against network and application-level attacks, fortifying defenses against intrusion attempts, malware, trojans, and various other threats.

Internal Audits

The IT team at SunarTech conducts spot-checks regularly to verify the enforcement and effectiveness of security controls. In the event of any observed deviations, corrective actions are promptly taken to enhance effectiveness. Additionally, an internal audit is performed every six months to ensure the ongoing implementation of procedures.

Authentication

We adhere to the principle of least privilege, ensuring that access is granted at a level necessary to perform specific business functions. Roles and areas of responsibility are carefully segregated to minimize opportunities for unauthorized or unintentional modification or misuse of the organization’s information or data.

Employees can only access project-specific data aligned with their assigned projects, and access permissions are precisely defined to prevent any unintentional modification or misuse of customer data.

Every employee is assigned a unique User ID, fostering individual accountability across all systems. Shared IDs used by multiple employees are strictly prohibited.

Vulnerability Assessment & Penetration Testing

We conduct Vulnerability Assessment and Penetration Testing (VAPT) on all systems and the internal network annually. This assessment is carried out by an external security vendor and follows a three-step process:

  1. Internal Vulnerability Assessment (VA)
  2. External Penetration Testing (VAPT)
  3. Remediation and Compliance Checks

This comprehensive approach ensures a thorough examination of our systems, both internally and externally, and includes subsequent steps to address and rectify any identified vulnerabilities or non-compliance issues.

Data Loss Prevention (DLP)

All systems are equipped with endpoint protection, and regular monitoring is conducted to identify devices that are not in compliance. The IT Admin team is duly authorized to take necessary actions on such systems and devices.