Privacy Policy
Effective Date: June 2025
At Crystal Blue Tech, we take your privacy seriously. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our services. Please read this privacy policy carefully. If you do not agree with the terms of this privacy policy, please do not access our services.
1. Information We Collect
1.1 Personal Information
We collect the following types of information:
- Name and contact information
- Business details and credentials
- Payment and transaction information
- Project specifications and requirements
- System access credentials
- Training and certification records
- Service usage data
1.2 Technical Information
Our systems automatically collect:
- Device and usage information
- IP addresses and geolocation data
- System logs and performance metrics
- Security monitoring data
- Network traffic analysis
- Service interaction patterns
2. Security Measures
2.1 Infrastructure Security
- Advanced firewall protection with IDS/IPS
- Military-grade 256-bit AES encryption
- TLS 1.3 protocols for data transmission
- Real-time threat monitoring and response
- Automated security scanning and patching
- Regular penetration testing
2.2 Access Controls
- Multi-factor authentication (MFA)
- Role-based access control (RBAC)
- Advanced session management
- Comprehensive access logging
- Regular access audits
- Zero-trust security model
3. Data Protection
3.1 Storage Security
- Secure, certified data centers
- End-to-end encryption
- Automated backup systems
- Data segregation protocols
- Disaster recovery procedures
- Business continuity planning
3.2 Processing Standards
- Purpose limitation controls
- Data minimization practices
- Accuracy verification processes
- Retention policy enforcement
- Processing activity records
- Data quality assurance
4. Your Rights
You have the right to:
- Access your personal data
- Correct inaccurate information
- Request data deletion
- Restrict processing
- Data portability
- Withdraw consent
5. Data Sharing and International Transfers
We may share your information with:
- Service providers and partners
- Legal authorities when required
- Third parties with your consent
International transfers are protected by appropriate safeguards including standard contractual clauses and data protection agreements.
6. Security Incident Management
Our incident response protocol includes:
- Immediate incident containment
- 24-hour notification system
- Detailed investigation procedures
- Evidence preservation methods
- Recovery process implementation
- Post-incident analysis and reporting
7. Regulatory Compliance
We comply with:
- Nigeria Data Protection Regulation (NDPR)
- General Data Protection Regulation (GDPR) principles
- Industry-specific standards and regulations
- Local and international data protection laws
8. Contact Information
For privacy-related inquiries, please contact our Data Protection Officer: