Our Telekom

Privacy Policy

Privacy Policy for Solomon Telekom Company Website

Contents

Introduction

1. Information We Collect

2. How We Use Your Information

3. Disclosure of Your Information

4. Security of Your Information

5. Your Rights

7. Cookies and Similar Technologies

8. Changes to This Policy

9. Contact Us

Introduction

Welcome to Solomon Telekom Company Ltd Privacy Policy. We are committed to protecting your privacy and ensuring that your personal information is handled in a safe and responsible manner. This policy outlines how we collect, use, disclose, and protect your personal information when you use our website and services, this is especially related to the interaction between ANZ e-Gateway for the sake of online payments. By using our website, you agree to the terms of this Privacy Policy.

We adhere to ISO/IEC 27001:2013 standards for information security management to ensure the highest level of protection for your data. 

1. Information We Collect

1.1 Personal Information
  • Identifiable Information:
    • When you make a purchase or attempt to make a purchase through our website, we collect certain information from you, including your name, billing address, payment information (including credit card numbers), email address, and phone number. 
  • Account Information:
    • If you create an account on our website, we collect your username, password, and other information necessary for account creation and maintenance.
  • Communications:
    • Any information you provide when communicating with us, such as through customer service interactions, emails, and phone calls. 
1.2 Technical Information
  • Device Information
    • We collect information about your device, including your IP address, web browser type and version, time zone setting, browser plug-in types and versions, operating system, and platform.
  • Usage Data
    • Information about how you use our website, such as the pages you visit, the time and date of your visit, the time spent on those pages, and other diagnostic data.
  • Cookies and Similar Technologies
    • We use cookies and similar tracking technologies to track the activity on our website and store certain information.

2. How We Use Your Information

2.1 To Provide and Maintain Our Services
  • Payment Processing
    • We use your personal information to process your payments through the ANZ e-Gateway, verify your payment information, manage payment disputes, and prevent fraudulent transactions.
  • Order Fulfillment
    • Your information is used to fulfill orders placed through the website, including processing your payment information, arranging for shipping, and providing you with invoices and/or order confirmations. 
2.2 To Communicate With You
  • Customer Support
    • We may use your contact information to communicate with you about your order, respond to inquiries, and provide customer support.
  • Promotional Messages
    • With your consent, we may send you promotional messages and marketing information about our products and services.
2.3 To Improve Our Services
  • Website Optimization
    • We use the information to improve and optimize our website, enhance user experience, and analyze how our customers use our website.
  • Analytics and Research
    • We may use your information to conduct research and analytics to understand trends and preferences among our users.
2.4 Legal and Regulatory Compliance
  • Compliance with Laws
    • We may use your personal information to comply with applicable laws, regulations, and legal processes.
  • Protecting Rights and Interests
    • We may use your personal information to protect our rights, property, and interests, as well as those of our customers and third parties.

3. Disclosure of Your Information

3.1Third-Party Service Providers
  • Payment Processors
    • We share your payment information with ANZ e-Gateway to process your transactions.
  • Shipping Companies
    • We share your shipping address with shipping companies to deliver your orders.(to be confirmed by meeting)
  • IT and Security Providers
    • We share information with third-party service providers who help us with IT and security services.
3.2 Legal Compliance
  • Law Enforcement Requests
    • We may disclose your personal information if required to do so by law or in response to valid requests by public authorities (e.g., a court or a government agency).
  • Legal Claims
    • We may disclose your personal information to establish, exercise, or defend our legal rights.
3.3 Business Transfers
  • Corporate Transactions
    • In the event of a merger, acquisition, or sale of all or a portion of our assets, your information may be transferred as part of that transaction.

4. Security of Your Information

We take the security of your personal information seriously and implement various measures to protect it from unauthorized access, use, or disclosure in compliance with ISO/IEC 27001:2013 standards.

4.1 Information Security Management System (ISMS)
  • ISMS Implementation
    • We have established an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2013 to systematically manage sensitive data and ensure its confidentiality, integrity, and availability. 
4.2 Risk Management
  • Risk Assessment
    • We conduct regular risk assessments to identify and address potential threats to the security of your personal information.
  • Mitigation Measures
    • We implement appropriate risk mitigation measures to reduce the likelihood and impact of security incidents
4.3 Access Controls
  • Restricted Access
    • Access to your personal information is restricted to employees and third-party service providers who need it to perform their job duties. These individuals are bound by confidentiality obligations.
  • Access Management
    • We use robust access management protocols to ensure that only authorized personnel have access to sensitive information. Utilizing our internal access request process.
4.4 Encryption
  • Data Transmission
    • All payment information is encrypted during transmission using SSL (Secure Socket Layer) and AES encryption systems to protect it from unauthorized access.
  • Data Storage
    • Your personal information is stored using encryption to protect it from unauthorized access and breaches. 
4.5 Regular Audits
  • Internal Audits
    • We conduct regular internal audits to ensure compliance with our ISMS and identify areas for improvement.
  • External Audits
    • We undergo periodic external audits to verify our compliance with ISO/IEC 27001:2013 standards.
    • We undergo annual external audits by KPMG to verify our finances and financial systems credibility and integrity.
4.6 Incident Management
  • Incident Response Plan
    • We have an incident response plan in place to promptly address and manage security incidents
  • Breach Notification
    • In the event of a data breach, we will notify affected individuals and relevant authorities in accordance with applicable laws and regulations. 
4.7 Regular Backups
  • Backup Frequency
    • We perform regular backups of all critical data to ensure that we can restore information in the event of data loss or corruption.
  • Storage of Backups
    • Backups are stored securely and are protected from unauthorized access, tampering, or destruction.
  • Backup Testing
    • We regularly test our backup systems and processes to ensure that data can be accurately and quickly restored.
  • Disaster Recovery Plan
    • We have a disaster recovery plan in place that includes procedures for data restoration from backups in the event of a significant incident

5. Your Rights

5.1 Access and Correction
  • Right to Access
    • You have the right to request access to the personal information we hold about you.
  • Right to Correct
    • You have the right to request correction of any inaccurate or incomplete information.
5.2 Deletion and Objection
  • Right to Deletion
    • You have the right to request the deletion of your personal information, subject to certain exceptions.
  • Right to Object
    • You have the right to object to the processing of your personal information for direct marketing purposes.
5.3 Withdrawal of Consent
  • Right to Withdraw Consent
    • You have the right to withdraw your consent to our processing of your personal information at any time.
5.4 Data Portability
  • Right to Data Portability
    • You have the right to request a copy of your personal information in a structured, commonly used, and machine-readable format.

6. Cookies and Similar Technologies

6.1 What Are Cookies?
  • Cookies are small text files that are placed on your device when you visit a website. They are widely used to make websites work more efficiently and to provide information to the site owners.
6.2 Types of Cookies We Use
  • Essential Cookies
    • These cookies are necessary for the website to function and cannot be switched off in our systems.
  • Performance Cookies
    • These cookies collect information about how visitors use our website, such as which pages are visited most often, and help us improve the performance of our site. 
  • Functional Cookies
    • These cookies allow the website to remember choices you make (such as your username, language, or the region you are in) and provide enhanced, more personalized features.
  • Targeting/Advertising Cookies
    • These cookies are used to deliver advertisements that are more relevant to you and your interests.
6.3 Managing Cookies
  • Cookie Settings
    • You can manage your cookie preferences through your browser settings. However, please note that disabling cookies may affect the functionality of our website.
  • Opt-Out
    • You can opt out of targeted advertising by visiting the relevant advertising network’s website.

7. Changes to This Policy

  • We may update this privacy policy from time to time to reflect changes to our practices or for other operational, legal, or regulatory reasons. Any changes will be posted on this page, and we will notify you of any significant changes.

8. Contact Us

  • If you have any questions about this privacy policy or our data practices, please contact us at: 333 Solomon Telekom Company customer services center.