We sincerely believe that you should always know what data we collect from you, the purposes for which such data is used, and that you should have the ability to make informed decisions about what you want to share with us.
Therefore, we want to be transparent about: (i) how and why we collect, store and use your personal data in the various capacities in which you interact with us; and (ii) the rights that you have to determine the contours of this interaction.
This Policy details the critical aspects governing your personal data relationship with STS : Your personal data relationship with us varies based on the capacity in which you interact with us/avail of our products and solutions (“Services”). You could be:
(I) A visitor to our website or any pages thereof (“Visitor”)
(II) A person/entity availing of one of our Services (“Customer”)
(III) An employee/agent/representative/appointee of a Customer who uses the said Service (“User”)
Based on whether you are a Visitor, Customer or User, the type of data we collect and the purpose for which we use it will differ and this Policy details such variations
This Policy is a part of and should be read in conjunction with our security terms and
This Policy will clarify the rights available to the personal data you share with us.
You provide your personal information (email, phone number, etc.) to us while contacting with us. We store that information reliably and securely. We use that information only for the purpose of serving you.
We use common Internet technologies, such as cookies, to keep track of your interactions with our Websites, applications, and emails.
Use of Collected Information:
STS uses information collected to provide you with the services you request. We may use information collected to provide you with additional information about our Services, partners, promotions, and events.
We may use information collected to improve our Websites and Services.
We do not share, sell, rent, or trade personally identifiable information with third parties for their promotional purposes.
At STS, we understand that securing and protecting your data is the most important responsibility we have.
Application Engineering and Development:
We follow secure software development lifecycle, where security testing is part of development, testing and pre-release acceptance. A security review is a mandatory part of application engineering (development and construction) process at STS.
Software Changes and Release Management:
Changes in our production environment follow a very well-defined, systematic process from development and test environments to verifying the changes finally on staging before production deployment. Production deployments are only done by authorized Development team members, and nobody else has access to our production environment.
STS takes the protection and security of its customers’ data very seriously. We manage the security of our application and customers’ data.
The STS development team has no access to data on production servers. Changes to the application, infrastructure, web content and deployment processes are documented extensively as part of an internal change control process.
Different environments are in use for development and testing purposes, access to systems are strictly managed, based on the principles of need to do/know basis appropriate to the information classification, with Segregation of Duties built in, and reviewed on a quarterly basis.
We Never Sell Personal Information
We do not share, sell, rent, or trade any information with third parties for their promotional purposes.
Use of Personal Information
(I) Improve your browsing experience by personalizing the Websites and to improve the Subscription Service
(II) Send information to you which we think may be of interest to you by post, email, or other means
(III) Send you marketing communications relating to our business which we think may be of interest to you.
The STS network where updates are developed, deployed, monitored and managed is secured by industry-grade firewalls and antivirus software, to protect internal information systems from intrusion and to provide active alerts in the event of a threat or an incident. Firewall logs are stored and reviewed periodically. Access to the production environment remotely is possible only via the office network. Audit logs are generated for each remote user session and reviewed. Also, the access to production systems are always through a multi-factor authentication mechanism.