Privacy Policy

Last Updated: 1st March 2026

Arica Tech Security LLP ("Company", "Arica Tech", "we", "our", or "us") is committed to protecting the privacy, confidentiality, and security of personal data and other information entrusted to us by individuals, organizations, and users who access our website or utilize our cybersecurity services. As a cybersecurity services provider, we recognize the critical importance of maintaining robust data protection practices and ensuring that personal and sensitive information is handled responsibly and in accordance with applicable legal and regulatory requirements.

This Privacy Policy explains how Arica Tech Security LLP collects, uses, processes, stores, discloses, and protects personal data and other information obtained through our website, digital platforms, and cybersecurity services. It also outlines the rights of users with respect to their personal data and describes the safeguards we implement to maintain the confidentiality and integrity of such information.

This Privacy Policy applies to all individuals and entities that interact with our digital infrastructure, including but not limited to visitors accessing our website, prospective clients making inquiries, organizations engaging our cybersecurity services, partners collaborating with us, and other users who access or utilize the tools, resources, or services provided by the Company through its online platform.

The scope of this Privacy Policy covers the collection and processing of information through our website, communication channels, service delivery processes, and any related digital systems operated by the Company. It governs the manner in which personal data and technical information may be collected during the course of cybersecurity assessments, consulting services, platform usage, or other interactions with Arica Tech Security LLP.

By accessing, browsing, or otherwise using our website or services, you acknowledge that you have read and understood this Privacy Policy and agree to the collection, processing, and use of your information in accordance with the provisions set forth herein. Your continued use of the website or services constitutes your acceptance of this Privacy Policy and any updates or modifications that may be made from time to time.

If you do not agree with the practices described in this Privacy Policy, you are advised to discontinue the use of our website and services.

1. DEFINITIONS

For the purposes of this Privacy Policy, the following terms shall have the meanings assigned to them below. Unless the context otherwise requires, words in the singular shall include the plural and vice versa, and references to persons shall include individuals as well as legal entities.

1.1. Personal Data

"Personal Data" means any information that relates to an identified or identifiable natural person ("data subject"). An identifiable individual is one who can be identified, directly or indirectly, by reference to an identifier such as a name, identification number, location data, online identifier, or by reference to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that individual.

Personal Data may include, but is not limited to:

  • name and contact information
  • email addresses and phone numbers
  • professional or organizational affiliation
  • IP addresses or device identifiers
  • online activity data or usage information
  • any other information that can reasonably be used to identify an individual.

1.2. Processing

"Processing" refers to any operation or set of operations performed on Personal Data or sets of Personal Data, whether by automated means or otherwise. Processing activities may include, without limitation: collection and recording of information; organization or structuring of data; storage or retention of data; adaptation or modification; retrieval, consultation, or analysis; transmission, disclosure, or sharing; restriction, erasure, or destruction of data. Processing may occur during the course of providing cybersecurity services, responding to inquiries, maintaining platform functionality, or complying with legal obligations.

1.3. User or Client

"User" or "Client" means any individual, organization, company, institution, or other legal entity that accesses, browses, interacts with, or uses the website, platform, or cybersecurity services provided by Arica Tech Security LLP. This term includes: website visitors; registered users; prospective or existing clients; representatives acting on behalf of organizations; partners, consultants, or collaborators interacting with the platform. Where an individual accesses the platform on behalf of an organization, the term "User" shall include both the individual and the entity they represent.

1.4. Platform

"Platform" means the official website and all related digital infrastructure operated by Arica Tech Security LLP through which information, services, tools, and cybersecurity resources are made available. The Platform may include, but is not limited to: the Company's website and associated web pages; online portals or client dashboards; cybersecurity assessment tools or reporting systems; communication interfaces or service request forms; downloadable materials or digital resources; any other digital services or systems provided or maintained by the Company for the purpose of delivering cybersecurity services. The Platform also includes any updates, enhancements, or additional digital services introduced by the Company from time to time.

2. INFORMATION WE COLLECT

We may collect several categories of information when users interact with our platform or services.

2.1. Personal Identification Information

This may include: Full name; Email address; Contact number; Organization name; Job title; Business contact information. This information may be collected when users: contact us through the website; request cybersecurity services; register for consultations; subscribe to communications.

2.2. Technical and System Information

Due to the nature of cybersecurity services, we may collect technical data including: IP addresses; device identifiers; server logs; network configurations; system architecture information; vulnerability scan results; security incident data. This information is necessary for performing security analysis and cybersecurity assessments.

2.3. Cookies and Usage Data

When users access our website, we may automatically collect certain data including: browser type; device information; pages visited; access times; referring URLs. This information may be collected using cookies or similar tracking technologies.

3. PURPOSE OF DATA COLLECTION

We collect and process data for legitimate business and cybersecurity purposes including:

  • delivering cybersecurity services
  • performing vulnerability assessments
  • conducting security analysis
  • responding to security incidents
  • providing technical support
  • improving platform performance
  • complying with regulatory requirements
  • communicating with clients.

4. LEGAL BASIS FOR PROCESSING

Where required under applicable laws, we process personal data based on the following lawful bases:

a. Contractual Necessity: Processing required to perform services requested by the client.

b. Legitimate Interests: Processing required for cybersecurity operations, fraud prevention, and platform security.

c. Legal and Regulatory Compliance: Processing required to comply with applicable legal obligations.

d. Consent: Where required by law, personal data may be processed based on the consent of the user.

5. DATA SHARING AND DISCLOSURE

We do not sell personal data. However, data may be shared with certain parties where necessary.

5.1. Service Providers

We may share information with trusted service providers including: cloud hosting providers; cybersecurity platforms; analytics providers; infrastructure providers. Such providers are contractually obligated to maintain confidentiality and data security.

5.2. Legal and Regulatory Authorities

We may disclose personal data where required by: court orders; regulatory authorities; law enforcement agencies; cybersecurity incident reporting obligations.

5.3. Business Transfers

In the event of a merger, acquisition, restructuring, or transfer of business assets, personal data may be transferred as part of the transaction.

6. INTERNATIONAL DATA TRANSFERS

Because cybersecurity services may require global infrastructure, personal data may be transferred internationally. Where such transfers occur, we implement safeguards in accordance with applicable laws including the General Data Protection Regulation. These safeguards may include: standard contractual clauses; secure encryption protocols; access control policies.

7. DATA SECURITY

We implement reasonable technical and organizational security measures to protect personal data including: encryption technologies; secure network infrastructure; role-based access control; security monitoring systems; vulnerability management procedures. However, no internet-based system can be completely secure.

8. DATA RETENTION

Personal data is retained only for as long as necessary to: provide services; comply with legal obligations; resolve disputes; maintain cybersecurity records. Once data is no longer required, it may be securely deleted or anonymized.

9. USER RIGHTS

Depending on applicable laws, users may have the following rights: right to access personal data; right to correct inaccurate information; right to request deletion of data; right to restrict processing; right to object to certain data uses; right to data portability. Users may exercise these rights by contacting the Company.

10. COOKIES POLICY

Our website may use cookies and similar technologies to enhance user experience and analyze website traffic. Users may control cookie settings through their browser preferences. Disabling cookies may affect certain functionalities of the website.

11. THIRD-PARTY LINKS

Our website may contain links to third-party websites or services. We are not responsible for the privacy practices or content of such external websites. Users should review the privacy policies of those websites independently.

12. CHILDREN'S PRIVACY

Our services are not directed toward individuals under the age of 18. We do not knowingly collect personal data from minors. If we become aware that such data has been collected, we will take steps to delete it.

13. CHANGES TO THIS PRIVACY POLICY

We may update this Privacy Policy periodically to reflect changes in legal requirements, technology, or operational practices. Updates will be published on the website along with the revised effective date. Continued use of the website constitutes acceptance of the updated policy.

14. CONTACT INFORMATION

If you have any questions regarding this Privacy Policy or the handling of personal data, please contact:

Arica Tech Security LLP

Office No 1204, CTS 682/686 KBC and Mahati Residency, Kothrud, Pune City, Maharashtra, India, 411038

Email: info@aricatech.com