Effective Date:
The Company affirms that the Product complies with all applicable provisions of the Information Technology Act, 2000, as amended from time to time, including the Information Technology (Amendment) Act, 2008.
2.2 Personal Data Protection Compliance
The Product complies with the Digital Personal Data Protection Act, 2023 (DPDP Act) and implements appropriate technical and organizational measures to ensure:
Lawful processing of personal data
Implementation of reasonable security safeguards
Adherence to purpose limitation principles
Data minimization practices
Data retention limits as prescribed by law
2.3 Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
The Company implements reasonable security practices and procedures as required under these Rules, including:
Comprehensive documented information security program
Implementation of international standards such as ISO/IEC 27001
Regular security audits and assessments
2.4 Compliance with Sectoral Regulations
Where applicable, the Product complies with sector-specific regulations, including:
CERT-In (Indian Computer Emergency Response Team) directives
MeitY (Ministry of Electronics and Information Technology) guidelines
Any other regulatory compliance requirements applicable to AI-based CCTV systems
3.1.1 Encryption
End-to-end encryption for data transmission
AES-256 encryption for data at rest
Secure key management protocols
3.1.2 Access Controls
Role-based access control (RBAC)
Multi-factor authentication (MFA) for administrative access
Principle of least privilege implementation
Regular access review and audit logs
3.1.3 Data Processing Security
Secure data processing environments
Segregation of environments (development, testing, production)
Regular vulnerability assessment and penetration testing
Secure cloud infrastructure with appropriate redundancy
Regular security patches and updates
Network security measures including firewalls, IDS/IPS systems
DDoS protection mechanisms
Secure development practices
Regular code reviews and security testing
Protection against OWASP Top 10 vulnerabilities
Regular security updates and patch management
A comprehensive incident response plan
Designated incident response team
Defined procedures for breach notification as per DPDP Act requirements
Regular testing of incident response procedures
Regular third-party security audits
Annual penetration testing
Vulnerability assessments by independent security experts
A refund will not be provided in the following cases:
Expiration of the Evaluation Period
Damage to the Product resulting from misuse, negligence, or improper installation by the customer
Compatibility issues arising from customer's failure to meet specified system requirements
Changes in customer's business requirements or expectations after purchase
Unauthorized modifications to the Product by the customer
If the refund request is approved:
Full refund: For requests within fifteen (15) days of purchase
Partial refund (75% of purchase price): For requests between sixteen (16) and thirty (30) days of purchase
Refunds will be processed within fourteen (14) business days of approval
Refunds will be issued through the original payment method used for purchase
Extended maintenance and support periods
Additional product features or services at no cost
Discounts on future purchases or renewals
The Product will substantially conform to its documentation for a period of one (1) year from the date of purchase
The Product does not infringe any intellectual property rights of any third party
Security updates will be provided throughout the subscription period
The Product is provided "as is" and "as available"
The Company disclaims all other warranties, express or implied
No warranty is provided regarding the accuracy of AI detection results, which are probabilistic in nature