Privacy Policy

Aviato Consulting Privacy Policy

Last Updated: 23/05/2024 

Introduction

Aviato Consulting (“we”, “us”, or “our”) is committed to protecting the privacy of our website visitors and users. This Privacy Policy describes the types of information we collect, how we use it, and the choices you have associated with your information. This policy applies to the websites https://aviato.consulting  (collectively, the “Site”). 

Information We Collect

We collect information about you in a number of ways, including:

Information You Provide: When you interact with our Site, you may provide us with personal information such as your name, email address, and other information you choose to provide in forms, comments, or when you contact us.
Log Data: Like many websites, we collect log data, including your IP address, browser type, operating system, referring/exit pages, and date/time stamps. We use this information to analyze trends, administer the Site, track user movement, and gather broad demographic information.
Cookies: We use cookies and similar tracking technologies to collect and store information about your usage of the Site. Cookies help us remember your preferences, understand how you use the Site, and improve your experience. You can manage your cookie preferences through your browser settings.
How We Use Your Information 

We use the information we collect for a variety of purposes, including:

To provide and operate the Site: We use your information to provide you with the features and functionality of the Site, including responding to your inquiries and providing customer support.
To improve the Site: We use your information to understand how our Site is used, to identify areas for improvement, and to develop new features.
To communicate with you: We may use your information to send you important information about the Site, updates, or promotional materials. You can opt out of receiving promotional communications from us at any time.
To protect the Site and our users: We may use your information to prevent fraud, abuse, or other illegal activities.
Data Security

We are committed to protecting your information and use industry-standard security practices, including those recommended by Google Cloud, to safeguard your personal information from unauthorized access, disclosure, alteration, or destruction. However, no website or online service can guarantee 100% security. 

Sharing Your Information

We may share your information with third-party service providers who perform services on our behalf, such as website hosting, data analysis, and customer support. These providers are obligated to protect your information in accordance with our instructions and applicable privacy laws.

We may also disclose your information if required by law, regulation, or legal process, or to protect the rights, property, or safety of ourselves, our users, or others.


Data Security

We are committed to protecting the privacy and security of your information. We employ robust security practices, adhering to best practices recommended by Google Cloud, and align to industry standards (ISO27001) to safeguard your personal data from unauthorized access, disclosure, alteration, or destruction. While no website or online service can guarantee 100% security, we strive to maintain the highest level of protection for your data.

Here’s a detailed overview of our data security practices based on Google Cloud recommendations:

Data Storage and Encryption:

  • Data Encryption at Rest: We leverage Google Cloud’s robust encryption capabilities to protect your data while it is at rest stored.
  • Data Encryption in Transit: Data transmitted between your browser and our servers is encrypted using industry-standard protocols like HTTPS (TLS/SSL).

Access Control and Identity Management:

  • Role-Based Access Control (RBAC): We implement granular access controls using Google Cloud’s RBAC system, ensuring that only authorized personnel have access to your data.
  • Strong Authentication: We utilize multi-factor authentication (MFA) for critical system access, requiring multiple forms of authentication to verify user identity.
  • Regular Auditing and Monitoring: We employ continuous monitoring tools provided by Google Cloud to detect potential security threats and unauthorized access attempts, and we perform regular audits to ensure compliance with security policies.

Security Best Practices and Compliance:

  • Google Cloud Security Best Practices: We follow Google Cloud’s recommended security best practices, including:
  • Regular Security Patching: We ensure all Google Cloud services are regularly updated with the latest security patches to address vulnerabilities.
  • Secure Configuration: We configure Google Cloud services with security best practices in mind, minimizing potential security risks.
  • Vulnerability Scanning: We leverage Google Cloud’s built-in vulnerability scanning tools to identify and mitigate potential vulnerabilities within our infrastructure.
  • Compliance Standards: We strive to comply with relevant data protection laws and regulations, including [mention specific regulations like GDPR, CCPA, etc., if applicable]. We regularly review our practices and policies to ensure ongoing compliance.

Data Retention and Deletion:

  • Data Retention Policies: We maintain clearly defined data retention policies, outlining how long we retain your personal information and the criteria for deletion.
  • Data Deletion: We provide mechanisms to allow users to request deletion of their personal information in accordance with our data retention policies.

Incident Response:

  • We have established incident response plans to handle security incidents effectively and promptly.
  • In the event of a data breach or security incident, we will notify affected individuals as required by law and take appropriate steps to mitigate the impact.

Ongoing Security Measures:

We continuously evaluate and update our security measures to adapt to evolving security threats and best practices. We remain committed to providing a secure environment for your data and will actively work to enhance our security posture.

Please note: While we implement comprehensive security measures, no system is completely immune to security breaches. It is important to be aware of the inherent risks associated with online services and to take steps to protect your personal information, such as using strong passwords and being mindful of phishing attempts.

Your Privacy Rights

You have the right to access, update, or delete the personal information we hold about you. You can also opt out of receiving promotional communications from us at any time. 

Changes to this Privacy Policy

We may update this Privacy Policy from time to time. We will post any changes on the Site and will indicate the date of the last update at the top of this Privacy Policy. 

Contact Us

If you have any questions about this Privacy Policy, please contact us at privacy@aviato.consulting

@2025 copyright by Aviato Consulting. All rights reserved