Last Updated: June 12, 2025
Our Commitment: We respect your privacy and are committed to protecting your personal information. This policy explains how we collect, use, and safeguard your data.
1. Information We Collect
1.1 Information You Provide
When you engage our services, we may collect:
- Contact Information: Name, email address, phone number, company name
- Project Details: Requirements, specifications, business information relevant to development
- Communication Records: WhatsApp messages, emails, meeting notes
- Payment Information: Billing address, payment preferences (processed through secure payment gateways)
1.2 Technical Information
During development and support, we may access:
- System credentials for deployment and setup (stored securely)
- Server logs and performance data
- Application usage data for debugging purposes
- Database schemas and sample data (for development purposes only)
1.3 Website Usage Data
Our website may collect:
- IP address and browser information
- Pages visited and time spent
- Referral sources
- Device and screen resolution data
Data Type |
Purpose |
Retention Period |
Contact Information |
Communication, project delivery |
2 years after project completion |
Project Files |
Development, support, maintenance |
1 year after final delivery |
Communication Records |
Reference, support, legal protection |
2 years after project completion |
System Credentials |
Deployment, maintenance access |
Deleted immediately after handover |
2. How We Use Your Information
2.1 Primary Uses
- Service Delivery: Developing, testing, and deploying your custom solutions
- Communication: Project updates, support, and technical discussions
- Account Management: Managing your project timeline, billing, and deliverables
- Support: Providing technical assistance and troubleshooting
2.2 Business Operations
- Processing payments and maintaining financial records
- Improving our development processes and service quality
- Legal compliance and business documentation
2.3 Marketing (Optional)
With your explicit consent, we may:
- Send updates about new services or packages
- Include your project as a case study (anonymized)
- Request testimonials or feedback
3. Information Sharing and Disclosure
3.1 We DO NOT Sell Your Data
We never sell, rent, or lease your personal information to third parties for marketing purposes.
3.2 Limited Sharing
We may share your information only in these circumstances:
- Service Providers: Hosting companies, payment processors (under strict confidentiality agreements)
- Legal Requirements: When required by law, court order, or government request
- Business Transfer: In case of merger, acquisition, or sale of business assets
- Your Consent: When you explicitly authorize sharing for specific purposes
3.3 Subcontractors
Occasionally, we may engage specialized subcontractors. They are bound by the same confidentiality and data protection standards.
4. Data Security Measures
Security First: We implement multiple layers of security to protect your information from unauthorized access, alteration, disclosure, or destruction.
4.1 Technical Safeguards
- Encryption: All data transmission uses HTTPS/TLS encryption
- Secure Storage: Database encryption and access controls
- Access Control: Role-based permissions and multi-factor authentication
- Regular Backups: Encrypted, geographically distributed backups
4.2 Operational Security
- Regular security audits and vulnerability assessments
- Secure development practices and code reviews
- Employee training on data protection and confidentiality
- Incident response procedures
4.3 Physical Security
- Secure workstation practices
- Protected development environments
- Secure disposal of physical media
5. Your Rights and Choices
5.1 Access and Correction
You have the right to:
- Access your personal information we hold
- Request corrections to inaccurate data
- Update your contact preferences
5.2 Data Portability
You can request a copy of your project data in a standard format for transfer to another provider.
5.3 Deletion Rights
You may request deletion of your personal information, subject to:
- Legal retention requirements
- Ongoing support obligations
- Business record-keeping needs
5.4 Communication Preferences
You can opt out of marketing communications at any time while maintaining service-related communications.
6. Cookies and Website Analytics
6.1 Cookie Usage
Our website uses minimal cookies for:
- Basic functionality (remembering preferences)
- Security (preventing fraud and abuse)
- Analytics (understanding website usage patterns)
6.2 Third-Party Services
We may use privacy-focused analytics tools that:
- Do not track individual users
- Aggregate data for insights only
- Comply with privacy regulations
- Allow easy opt-out options
7. International Data Transfers
As a Malaysia-based service provider, your data is primarily processed within Malaysia. However, some services we use (cloud hosting, communication tools) may involve data transfer to other countries with adequate data protection standards.
8. Data Retention
8.1 Project Data
- Active Projects: Data retained throughout project lifecycle
- Completed Projects: Source code and documentation retained for 1 year for support purposes
- Client Communications: Retained for 2 years for reference and legal protection
8.2 Financial Records
Billing and payment information retained for 7 years as required by Malaysian tax regulations.
8.3 Automatic Deletion
We implement automated deletion processes to ensure data is not retained longer than necessary.
9. Children's Privacy
Our services are not intended for individuals under 18 years of age. We do not knowingly collect personal information from children. If we become aware of such collection, we will delete the information immediately.
10. Business Clients and Employee Data
10.1 B2B Data Processing
When working with business clients, we may process employee data for:
- User account creation and management
- System access and permissions
- Training and support purposes
10.2 Data Controller Responsibilities
Our business clients remain the data controllers for their employee data. We act as processors and follow their instructions regarding data handling.
11. Incident Response
11.1 Data Breach Procedures
In the unlikely event of a data breach, we will:
- Immediately investigate and contain the incident
- Notify affected clients within 72 hours
- Provide detailed information about the breach and mitigation steps
- Implement additional security measures to prevent recurrence
11.2 Client Notification
We will inform you of any security incidents that may affect your data, including the nature of the incident and steps being taken to address it.
12. Updates to This Policy
12.1 Policy Changes
We may update this privacy policy to reflect:
- Changes in our business practices
- New legal requirements
- Enhanced security measures
- Client feedback and requests
12.2 Notification Process
Significant changes will be communicated through:
- Email notification to active clients
- Website announcements
- Direct communication during ongoing projects
13. Legal Basis for Processing
We process your personal data based on:
- Contract Performance: To fulfill our service agreements with you
- Legitimate Interests: For business operations, security, and service improvement
- Legal Obligations: To comply with applicable laws and regulations
- Consent: For marketing communications and optional features (where required)
14. Contact Information and Requests
15. Compliance and Certifications
Our privacy practices align with:
- Malaysia Personal Data Protection Act (PDPA) 2010
- General Data Protection Regulation (GDPR) principles
- ISO 27001 security standards guidelines
- Industry best practices for software development
Your Trust Matters: We continuously review and improve our privacy practices to ensure your information remains secure and your rights are protected. If you have any concerns, please don't hesitate to contact us.