This Privacy Policy describes how ISIKMAN LTD ("ISIKMAN Limited", "we", "us", "our") collects, uses, stores, and protects personal information when you use our website and communication channels. We apply data minimization and process only information reasonably required for legitimate business and security purposes.
1. Data We Collect
When you submit our contact form or communicate with us, we may collect your name, business email, message subject, and message content. For service protection and abuse prevention, we may also collect technical metadata such as submission timestamp, IP address, browser user-agent, request path, and anti-spam verification markers.
2. How We Use Data
- To respond to business, technical, and support inquiries.
- To protect website operations against abuse, spam, and unauthorized activity.
- To troubleshoot incidents and maintain operational continuity.
- To improve communication and service quality at process level.
3. Legal Basis
Processing is generally based on legitimate business interest in receiving and responding to professional inquiries and operating a secure website. Where required, processing may also rely on consent, contractual necessity, or legal obligation.
4. Retention
We keep inquiry records and technical logs for only as long as needed for business handling, service integrity, and legal or compliance requirements. Retention periods vary according to data category and operational context.
5. Data Sharing
We do not sell personal data. Limited data may be processed by trusted hosting or infrastructure providers solely for service operation, maintenance, and security functions under confidentiality controls.
6. Cookies
Our website uses essential cookies required for baseline security and session integrity. Optional analytics or marketing cookies are not required for core functionality and remain disabled unless explicitly enabled in future updates.
7. Cross-Border Processing
Depending on infrastructure setup, information may be processed in more than one jurisdiction. When cross-border handling is required, we apply reasonable contractual and technical safeguards.
8. Security Controls
We implement practical security controls including access limitation, anti-abuse validation, secure coding measures, and structured logging for incident analysis. No environment is fully risk-free, and controls are periodically improved.
9. Your Rights
Subject to applicable law, you may request access, correction, or deletion of personal data and may object to specific processing activities. Reasonable identity verification may be required before handling requests.
10. Contact for Privacy Requests
For privacy inquiries: [email protected] and [email protected].
11. Updates
We may revise this policy to reflect legal, technical, or operational updates. The latest version will be published on this page with an updated effective date.