Last updated: Feb 2, 2023
Welcome to the Privacy Policy of cypher-b, a blockchain-based verification system deployed on Polygon. At cypher-b, we understand the importance of privacy and take the protection of personal information very seriously. This Privacy Policy explains how we collect, use, store, and share personal information, as well as the rights users have with respect to their personal information.
The scope of this Privacy Policy applies to all users of cypher-b and covers the collection, use, storage, and sharing of personal information, whether collected directly from our users or through third-party sources used in processing personal information. We are committed to providing secure and efficient verification services to our users, and this Privacy Policy is designed to give users a clear understanding of how we handle their personal information. If you have any questions or concerns, please do not hesitate to contact us. Thank you for using cypher-b.
For the purposes of this Privacy Policy:
Personal Information refers to any information that can be used to identify an individual, such as name, email address, IP address, etc.
Service refers to the verification services provided by cypher-b.
Users refer to individuals who use the cypher-b service.
Third-Party refers to any entity outside of cypher-b that may collect, store, or process personal information on behalf of cypher-b.
IPFS refers to the InterPlanetary File System, a distributed file system used to store personal information by cypher-b.
MongoDB refers to the MongoDB database management system, a database used by cypher-b to store personal information.
Encryption refers to the process of converting plain text into a coded form to prevent unauthorized access to personal information.
Service refers to the Application.
Secure Access Controls refer to the measures put in place to prevent unauthorized access to personal information, such as password protection, encryption, etc.
Blockchain is a decentralized, digital ledger used to record transactions across many computers in a secure and transparent manner.
Cryptography is the practice of secure communication, which includes the creation of secure codes for data protection and authentication.
Smart Contract is a self-executing contract with the terms of the agreement between buyer and seller being directly written into lines of code.
Node is a device connected to a blockchain network that stores a copy of the blockchain and participates in the verification and validation of transactions.
Consensus Mechanism is a system for reaching agreement among nodes in a blockchain network on the valid state of transactions.
Public Key is a unique, publicly accessible code that is used to encrypt and decrypt data in a blockchain.
Private Key is a secret code that is used to access and control transactions in a blockchain, and should be kept confidential by the user.
At cypher-b, we take privacy seriously and understand the importance of protecting the personal information of our users. This section of our Privacy Policy explains the types of personal information that we collect, how it is collected, and the purposes for which it is used. Types of Personal Information Collected:
Contact Information: This includes information such as name, email address, postal address, and telephone number. This information is collected during user registration and may also be collected when users interact with our customer support team.
Demographic Information: This includes information such as age, gender, and location. This information is collected during user registration and may also be collected through the use of our service, such as through the IP address of the device used to access the service.
Usage Information: This includes information about how users interact with the cypher-b service, such as the frequency and duration of use. This information is collected through the use of our service, as well as through the use of cookies and other tracking technologies.
Technical Information: This includes information about the device and network used to access the service, such as IP address, browser type, and operating system. This information is collected through the use of our service and may also be collected through the use of cookies and other tracking technologies.
Certificate Information: This includes information about the certifications held by users, such as professional or educational certifications. This information may be provided by users during registration or through the use of our verification service.
The personal information collected by cypher-b is used for the following purposes:
To provide our verification services to users, including the verification of certifications.
To improve the functionality and user experience of our service.
To communicate with users regarding the use of our service and to respond to inquiries and requests for support.
To comply with applicable laws and regulations.
We will only collect personal information that is necessary for the purposes outlined above and will not use personal information for any other purpose without obtaining the prior consent of the user.
In summary, cypher-b collects personal information to provide our verification services and to improve the user experience of our service. We take appropriate measures to ensure the security of personal information collected through our service and are committed to protecting the privacy of our users.
At cypher-b, we take the privacy of our users very seriously, which is why we use personal information collected through our service in a transparent and responsible manner. This section of our Privacy Policy provides a detailed explanation of how we use personal information and the measures we take to protect it.
Service Provision: The primary purpose of collecting personal information is to provide our verification services to users. This includes verifying the certifications held by users, providing information about their certifications to interested parties, and maintaining records of the certifications for regulatory compliance purposes.
User Experience: In addition to providing our verification services, we also use the personal information we collect to improve the functionality and user experience of our service. This includes using usage information to understand how users interact with our service and to identify any areas for improvement. This information is also used to personalize the experience of users and to provide them with relevant information about our service. Communication:
Communication: We use the personal information we collect, such as email addresses, to communicate with users regarding the use of our service and to respond to inquiries and requests for support. This includes sending notifications about updates to our service, promotional offers, and information about the use of our service.
Compliance: We may use personal information to comply with applicable laws and regulations, including responding to legal requests for information. This may include providing information to law enforcement agencies or other government bodies in response to a subpoena or other legal request.
Third-Party Processing: We may use third-party service providers to process personal information on our behalf. For example, we may use a cloud service provider to store personal information or a data analytics provider to analyze usage information. When selecting third-party service providers, we take great care to ensure that they provide appropriate security measures to protect personal information and that they are subject to obligations of confidentiality. This includes using only service providers who are certified under internationally recognized data protection standards, such as ISO 27001 or SOC 2.
Retention of Personal Information: We retain personal information for as long as necessary to provide our verification services and to comply with applicable laws and regulations. When personal information is no longer needed, we take appropriate measures to securely delete or destroy it.
At cypher-b, we understand the importance of protecting personal information and take the storage of this information very seriously. This is why we have implemented a range of technical and organizational measures to ensure that personal information is stored securely and protected from unauthorized access, theft, and loss.
IPFS Storage: We use the InterPlanetary File System (IPFS) to store personal information, which is a decentralized network for storing and sharing files. IPFS uses a unique and secure hash for each file, which ensures that personal information cannot be tampered with or altered. Furthermore, IPFS uses encryption to protect personal information from unauthorized access, ensuring that only those with the proper authorization can access it.
MongoDB Storage: In addition to IPFS, we may also store personal information using MongoDB, a leading NoSQL database management system. MongoDB provides robust security features, including encryption at rest, secure access controls, and regular security audits to ensure that personal information is protected from unauthorized access.
Encryption: Encryption is a critical component of our security strategy, as it helps to ensure that personal information is protected both in transit and at rest. This means that personal information is encrypted before it is stored on IPFS or MongoDB and when it is transmitted between our service and users. We use industry-standard encryption algorithms, such as AES-256, to ensure that personal information is protected at all times.
Access Controls: We have strict access controls in place to ensure that only authorized personnel can access personal information. This includes both technical and organizational measures, such as role-based access controls, multi-factor authentication, and regular security audits. This helps to ensure that personal information is protected from unauthorized access, theft, and loss.
Third-Party Storage: In some cases, we may use third-party service providers to store personal information on our behalf. For example, we may use a cloud service provider to store backups of personal information.
When selecting third-party storage providers, we take great care to ensure that they provide appropriate security measures to protect personal information and that they are subject to obligations of confidentiality. This includes using only storage providers who are certified under internationally recognized data protection standards, such as ISO 27001 or SOC 2. Additionally, we have put in place contractual measures to ensure that personal information is protected when it is stored with these providers.
In conclusion, we take the storage of personal information very seriously at cypher-b and have implemented a range of technical and organizational measures to ensure that it is stored securely and protected from unauthorized access, theft, and loss. This includes using IPFS and MongoDB, encryption, secure access controls, and third-party storage providers who provide appropriate security measures and are subject to obligations of confidentiality.
At cypher-b, we value the trust that our users place in us and are committed to protecting their personal information. As such, we do not sell personal information to third parties. Circumstances for Sharing Personal Information:
In certain limited circumstances, we may be required to share personal information with third parties. For example, we may be required to comply with a court order or to protect the rights and interests of cypher-b and its users. In these cases, we will only share personal information to the extent necessary and will always take steps to ensure that personal information is protected.
In some cases, we may use third-party services to process personal information on our behalf. For example, we may use a payment processor to process payment information. When selecting third-party processing providers, we take great care to ensure that they provide appropriate security measures to protect personal information and that they are subject to obligations of confidentiality. This includes using only processing providers who are certified under internationally recognized data protection standards, such as ISO 27001 or SOC 2. Additionally, we have put in place contractual measures to ensure that personal information is protected when it is processed by these providers.
Your consent to this Privacy Policy followed by Your submission of such information represents Your agreement to that transfer.
The Company will take all steps reasonably necessary to ensure that Your data is treated securely and in accordance with this Privacy Policy and no transfer of Your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of Your data and other personal information.
In conclusion, we do not sell personal information to third parties and only share it in limited circumstances where it is necessary to comply with a court order or to protect the rights and interests of cypher-b and its users. When using third-party processing providers, we take steps to ensure that personal information is protected by selecting only providers who provide appropriate security measures and are subject to obligations of confidentiality."
At cypher-b, we understand the importance of personal information and take care to ensure that it is stored securely and only for as long as it is necessary.
The length of time that personal information is retained will vary depending on the purpose for which it was collected. For example, personal information related to billing and payment may be retained for a longer period of time than personal information collected for the purpose of providing customer support.
In general, we will retain personal information for no longer than is necessary for the purpose for which it was collected, or as required by applicable laws and regulations.
In some cases, we may use third-party services to store personal information. For example, we may use a cloud storage provider to store backups of personal information. When selecting third-party storage providers, we take great care to ensure that they provide appropriate security measures to protect personal information and that they are subject to obligations of confidentiality. This includes using only storage providers who are certified under internationally recognized data protection standards, such as ISO 27001 or SOC 2. Additionally, we have put in place contractual measures to ensure that personal information is protected when it is stored by these providers.
In conclusion, personal information is only retained for as long as is necessary for the purpose for which it was collected. When using third-party storage providers, we take steps to ensure that personal information is protected by selecting only providers who provide appropriate security measures and are subject to obligations of confidentiality."
At cypher-b, we understand the importance of privacy and believe in giving users control over their personal information. That's why we provide users with the following rights:
Access: Users have the right to access the personal information that we hold about them. This includes the right to request a copy of their personal information and information about how it has been used.
Correction: Users have the right to correct any inaccuracies in their personal information. This includes the right to have any incomplete personal information completed.
Deletion: Users have the right to request that their personal information be deleted. In some cases, we may not be able to fulfill a request to delete personal information if it is necessary for us to retain it for legal or business purposes. In such cases, we will explain the reasons for our decision.
Portability: Users have the right to receive a copy of their personal information in a structured, commonly used, and machine-readable format.
Users can exercise their rights at any time by contacting us using the contact information provided in this Privacy Policy. When making a request, we may ask for information to verify the identity of the user making the request. This is to ensure that personal information is only shared with the correct user and to protect the privacy of others. We will respond to all requests within a reasonable timeframe and in accordance with applicable laws.
At cypher-b, we use blockchain technology to store some of the personal information that we collect. This technology provides an additional layer of security as it is decentralized and resistant to tampering. When personal information is stored on the blockchain, it is encrypted and can only be accessed by authorized users.
In conclusion, we take the protection of personal information seriously and believe in giving users control over their personal information. Users can exercise their rights by contacting us at any time. Our use of blockchain technology ensures that personal information is stored securely and can only be accessed by authorized users."
The security of personal information is of utmost importance to cypher-b. To protect the privacy and security of its users, cypher-b has implemented a number of technical, administrative, and physical security measures. These measures are designed to safeguard personal information against unauthorized access, alteration, theft, and destruction.
Some of the measures implemented by cypher-b include:
Encryption: All personal information stored on IPFS and MongoDB is encrypted using industry-standard encryption algorithms to protect against unauthorized access.
Secure Access Controls: Only authorized personnel have access to personal information and they are required to follow strict security procedures to ensure the privacy and confidentiality of personal information.
Firewall Protection: Firewall protection is in place to prevent unauthorized access to personal information stored on IPFS and MongoDB.
Regular Security Audits: Regular security audits are conducted to ensure that the security measures implemented by cypher-b are effective in protecting personal information.
Employee Training: Employees of cypher-b receive regular training on the importance of privacy and the need to protect personal information.
These security measures are regularly reviewed and updated to ensure that they remain effective and that they keep pace with the evolving threat landscape.
At cypher-b, we are committed to protecting the privacy of children, and to complying with all applicable laws and regulations related to children's privacy. In India, draft Digital Personal Data Protection Bill, 2022 is the law that governs the online collection of personal information from children under the age of 18. Internationally, there may be similar laws in different countries that apply to the online collection of personal information from children. To comply with these laws, cypher-b has taken several steps to protect the privacy of children, including:
Prohibiting the collection of personal information from children under the age of 18, unless it is with the verifiable consent of a parent or guardian.
Implementing secure storage and access controls for personal information to prevent unauthorized access and misuse of personal information.
Providing clear and transparent information to parents and guardians about our data collection and protection practices.
In the event that we become aware of the collection of personal information from a child under the age of 18 without verifiable parental consent, we will take steps to delete the information as soon as possible.
If a parent or guardian has any concerns about their child's personal information or the privacy of their child on cypher-b, they can reach out to us through the contact information provided in our Privacy Policy.
At cypher-b, we understand the importance of keeping our users informed about any changes to our Privacy Policy. We strive to maintain the privacy and security of our users' personal information, and we want to ensure that our users are aware of any updates to our Privacy Policy that may affect the protection of their information.
In the event of changes to our Privacy Policy, we will communicate the updates to our users through clear and prominent notices on our website or through other appropriate means. These notices will provide a summary of the key changes and the effective date of the updates.
We will make any necessary changes to our Privacy Policy in a timely manner, and we will update our users as soon as possible. The effective date of the changes will be clearly stated in the notice, and the updated policy will be easily accessible on our website.
We encourage our users to review our Privacy Policy regularly to stay informed about our data collection and protection practices. If our users have any questions or concerns about the changes to our Privacy Policy, they can reach out to us through the contact information provided in the policy.
In conclusion, our commitment to protecting our users' personal information remains unchanged, and we are dedicated to communicating any changes to our Privacy Policy in a clear and transparent manner. Our goal is to ensure that our users are fully informed about our data protection practices and that their personal information remains secure.
At cypher-b, we value the privacy of our users and are committed to providing a safe and secure experience. If our users have any questions or concerns about their personal information or our Privacy Policy, we encourage them to reach out to us through the following channels:
Email: Our users can send an email toinfo@cypherb.com. In the email, they should include their name, a brief description of their inquiry, and a preferred method of contact.
Phone: Our users can call us at +91 8341980196. They should have their name and a brief description of their inquiry ready.
Postal Mail: Our users can send a letter to AU incubation centre, AU college of engineering, Visakhapatnam. In the letter, they should include their name, a brief description of their inquiry, and a return address.
We are committed to responding to our users' inquiries in a timely and efficient manner, and we will make every effort to address their concerns. Our goal is to provide clear and transparent communication about our data collection and protection practices, and to ensure that our users feel confident and secure using our service.
The cypher-b Privacy Policy is intended to provide protection for the personal information of users, regardless of their location. In order to achieve this goal, we have taken steps to ensure compliance with privacy laws in India, as well as international laws, such as the European Union's General Data Protection Regulation (GDPR).
The laws of India take precedence over any conflicting laws of other jurisdictions. This means that, if a conflict arises between the laws of India and the laws of another jurisdiction, we will make efforts to comply with the more stringent law.
If you are a user accessing cypher-b from within India, the laws of India will apply to the collection, use, storage, and sharing of your personal information. This means that your personal information will be subject to the protections provided by Indian privacy laws. If you are a user accessing cypher-b from outside of India, your personal information may still be subject to Indian privacy laws, as well as the privacy laws of your jurisdiction. In these cases, we will make efforts to comply with the most stringent privacy laws that apply to your personal information.
In addition to Indian privacy laws and the GDPR, we may also take steps to comply with other privacy laws and regulations in jurisdictions where we do business or where our services are accessible to users.
If you have any questions or concerns about the jurisdiction of the cypher-b Privacy Policy, please reach out to us through the contact information provided in our Privacy Policy. Our goal is to ensure the protection of your personal information, regardless of your location, and we will make every effort to comply with the privacy laws that apply to your personal information.