Privacy and Security Policy
This Privacy and Security Policy ("Policy") outlines how InRiskable ("we," "our," or "us") collects, uses, protects, and discloses personal and non-personal information when you use our software. We prioritize the privacy and security of your information and are dedicated to complying with applicable data protection laws. By using Inriskable, you agree to the terms and practices described in this Policy.


1. Personal Information:
We collect personal information from you when you interact with our software. This includes details such as your name, email address, and contact information. By collecting this information, we are able to provide you with a personalized and tailored experience when using our software. Additionally, we may also ask for your professional credentials and qualifications, as well as your financial institution details. These additional details are collected to ensure that our software is being used by authorized individuals and to facilitate any financial transactions that may be necessary.

It's important to note that we handle your personal information with the utmost care and take appropriate measures to protect it from unauthorized access, disclosure, or alteration. We only collect the necessary personal information required to fulfill the intended purpose of our software and do not share it with third parties unless explicitly stated in this privacy policy or required by law.

1.1 Non-Personal Information: In addition to personal information, we also collect non-personal information that does not directly identify you. This type of information is collected to help us understand how our software is being used and to improve its functionality and performance. Non-personal information may include aggregated usage statistics, such as the number of users accessing our software, the frequency of usage, and the features that are most commonly used. We may also collect IP addresses, which can provide general location information, and device information such as browser type, operating system, and device identifiers. This information is collected in an anonymized and aggregated form, meaning that it is not associated with any specific individual.

The collection of non-personal information allows us to analyze usage patterns, identify areas for improvement, and make informed decisions to enhance user experience. Rest assured that this information is used solely for internal purposes and is not shared with third parties in a way that could personally identify you, unless required by law.

We value your privacy and are committed to maintaining the confidentiality and security of both your personal and non-personal information. If you have any concerns or questions regarding our privacy practices, please don't hesitate to contact us using the provided contact information in this privacy policy.

2. Use of Information

2.1 Personal Information: When it comes to personal information, we use it in order to provide you with access to our software and enhance your overall user experience. This involves a few different aspects:

2.1.1 Verifying your identity and eligibility: We may need to confirm that you are who you say you are and that you meet the necessary requirements to use our software. This helps us maintain the security and integrity of our platform.
2.1.2 Delivering personalized content and recommendations: We aim to tailor the content and recommendations you receive through our software to better suit your individual preferences and needs. By utilizing your personal information, we can offer a more customized experience.
2.1.3 Responding to inquiries and providing customer support: If you have any questions, concerns, or inquiries about our software, we will use your personal information to address them and provide you with the necessary support.
2.1.4 Notifications about updates, changes, or new features: We may send you notifications to inform you about any updates or changes to our software, as well as to let you know about new features that may be of interest to you.

2.2 Non-Personal Information: Non-personal information refers to data that does not personally identify you. We use this type of information to analyze and enhance various aspects of our software, including performance, security, and user experience. It's important to note that while non-personal information does not personally identify you, we still take appropriate measures to protect it and ensure its confidentiality.

2.2.1 Analysis for performance improvement: By analyzing non-personal information, we can identify patterns, trends, and areas for improvement within our software. This helps us optimize its performance and ensure a smooth user experience.
2.2.2 Enhancing security: Non-personal information can also be used to identify potential security risks or vulnerabilities within our software. By analyzing this data, we can take proactive measures to enhance the security of our platform and protect user data.
2.2.3 Improving user experience: By understanding how users interact with our software on an aggregated and anonymized level, we can make informed decisions to enhance the overall user experience. This may involve making adjustments to the interface, adding new features, or improving existing functionalities.
2.2.4 Statistical analysis and reporting: Non-personal information is often aggregated and anonymized to generate statistical analysis and reports. These reports help us gain insights into usage patterns, trends, and overall software performance, which we can then use to inform our decision-making processes and improve our software.

3. Information Sharing
3.1 Service Providers: In order to enhance and optimize our software, we may collaborate with trusted third-party service providers. These providers are bound by a contractual agreement that requires them to uphold the confidentiality and security of any personal information they may access during the course of their services. This means that they are legally obligated to handle the information in a responsible manner and take appropriate measures to protect it.

When we share personal information with service providers, it is solely for the purpose of assisting us in delivering and improving our software. They may perform various tasks on our behalf, such as hosting the software on their servers, providing technical support, analyzing user data, or conducting surveys. However, they are not permitted to use or disclose this information for any other purposes unrelated to the services they are providing to us.Rest assured that we carefully select our service providers and take steps to ensure that they are reputable and trustworthy organizations with robust data protection practices.

3.2 Legal Compliance: We understand the importance of complying with applicable laws and regulations. In certain circumstances, we may be required to disclose personal information in response to a lawful request from a government agency, court order, or legal process. This means that if we are compelled by law to disclose your personal information, we will do so.Furthermore, we may disclose personal information if we believe it is necessary to protect our software, our users, or the rights and property of our company. This includes situations where we need to enforce our terms and conditions, investigate potential fraud or security breaches, or prevent harm to individuals or the public.While we strive to respect your privacy and protect your personal information, we also recognize the importance of maintaining the integrity and security of our software and its users. We will only make disclosures of personal information under the circumstances outlined above, and we will do so in accordance with applicable laws and regulations.

4. Data Security
4.1 Security Measures: This section outlines the steps we have taken to protect your personal information from unauthorized access, disclosure, alteration, or destruction. We have implemented industry-standard security measures to ensure the confidentiality and integrity of your data. These measures may include encryption, which involves encoding information in a way that can only be accessed or decoded with the appropriate encryption key. By utilizing encryption, we make it difficult for unauthorized individuals to intercept or read your personal information.In addition to encryption, we also employ access controls.

Access controls are mechanisms that limit access to personal information to only authorized individuals who have a legitimate need to access the data. By implementing access controls, we reduce the risk of unauthorized individuals gaining access to your personal information.We conduct regular security assessments to identify any vulnerabilities or weaknesses in our systems and infrastructure. These assessments help us proactively address any potential security risks and ensure that our security measures remain up to date.

Furthermore, we provide comprehensive employee training on data security and privacy practices. Our employees undergo training to ensure they understand the importance of protecting personal information and are aware of the best practices for handling data securely. By educating our employees, we aim to create a culture of privacy and data protection within our organization.

4.2 Data Retention: This section explains how long we will retain your personal information. We retain personal information for as long as it is necessary to fulfill the purposes outlined in our privacy policy. The purposes may include providing services to you, responding to your inquiries or requests, complying with legal obligations, or pursuing legitimate business interests.

However, we will not retain your personal information for longer than necessary. If there is no longer a legitimate purpose for retaining your data or if we are no longer required to retain it by law, we will securely dispose of or anonymize your personal information.It's important to note that in some cases, we may be required or permitted by law to retain your personal information for a longer period. If that is the case, we will comply with the applicable legal requirements and ensure that appropriate safeguards are in place to protect the data during the extended retention period.measures include encryption, access controls, regular security assessments, and comprehensive employee training.

5. Your Choices and Rights
5.1 Access and Correction:
This section guarantees your right to access and update the personal information that a company or organization has collected about you. It means that you have the right to request details about the personal data they hold, such as your name, contact information, or any other information you have provided. Additionally, if you find that any of your personal information is incorrect or needs to be updated, you can request the necessary corrections. To exercise this right, you'll need to contact the company or organization directly using the contact information provided in Section 7 of the privacy policy.

5.2 Marketing Communications:
This section relates to your ability to control the marketing communications you receive from the company or organization. You have the option to opt-out of receiving marketing communications, such as promotional emails, newsletters, or advertisements. The privacy policy should provide instructions on how to opt-out of these communications. You can typically find these instructions within the marketing communications themselves or by directly contacting the company. By opting out, you can choose not to receive future marketing materials.

6. Third-Party Links and Services
In our software or platform, there may be links that direct you to websites or services that are operated and controlled by third parties. These third-party websites or services are not owned or managed by us, and therefore, the terms and conditions of this Privacy Policy do not apply to them.

It is important for you to understand that when you click on these third-party links or engage with their services, you are leaving our platform and entering a different website or service that operates under its own privacy policies. We encourage you to carefully review the privacy policies and practices of these third-party websites or services before providing any personal information or engaging in any activities on those platforms.

By doing so, you can ensure that you understand how your personal information may be collected, used, and shared by those third parties. We are not responsible for the privacy practices or the content of any third-party websites or services, and we do not endorse or take any responsibility for them.It's important to note that while we strive to include only trustworthy and reputable third-party links and services in our software or platform, we cannot guarantee the privacy and security of your personal information once you leave our platform and interact with these third-party websites or services. Therefore, it is always advisable to exercise caution and make informed decisions when accessing and using third-party links or services.If you have any concerns or questions about the privacy practices of any third-party websites or services, we recommend contacting the respective third parties directly for clarification and assistance.

7. Contact Us
If you have any questions, concerns, or requests regarding this Policy or the privacy and security practices of our software, please contact us at:
Email: privacy@inriskable.com

8.
Updates to this Policy
We may update this Policy from time to time to reflect changes in our practices or legal obligations. Any updates will be posted on our website, and the revised Policy will take effect immediately upon posting.This Privacy and Security Policy ("Policy") outlines how Inriskable ("we," "our," or "us") collects, uses, protects, and discloses personal and non-personal information when you use our software. We prioritize the privacy and security of your information and are dedicated to complying with applicable data protection laws. By using Inriskable, you agree to the terms and practices described in this Policy.