Terms & Conditions
Purpose Of Policy

The purpose of this policy presents Butterfly Learnings commitment for privacy of user information and sensitive commercial/financial data.

Scope of Policy

This policy applies to all data that is either owned or managed by Butterfly Learnings.

Supporting Documents

List of documents supporting this policy,

  • ● Information Security Policy
  • ● Chief Information Security Officer is responsible for development, implementation, maintenance and enforcement of the policy
  • ● Butterfly Learnings ’s Internal Audit Team is responsible for conducting regular audits to ensure compliance to this policy
  • ● Employees and non-employees of Butterfly Learnings are responsible and/or accountable to ensure adherence to the terms of this policy in the course of their job duties
Policy Statements

The privacy policy displayed to the user must clearly communicate minimum of the following information:

  • ● Purpose for collection of personal information
  • ● Manner in which the information will be processed
  • ● Controls for protection of personal information
  • ● Usage of tools such as cookies to collect personal information online
  • ● Details of information such as IP address, Domain information captured about the user
  • ● Sharing of information with third parties
  • ● User rights to access of personal information
  • ● Details to contact Butterfly Learnings for queries on processing personal information
  • ● Butterfly Learnings commitment to privacy and security
  • ● Period for which the terms and conditions are valid
  • ● Butterfly Learnings information security standards and practices
  • ● Policy on external links
    • i. Butterfly Learnings will not use information about user activities on the Internet together with any information that would result in user being identified without his consent.
    • ii. Butterfly Learnings will not associate the information collected by software utilities (cookies, single-pixel gif images) with user name or email address, at the time of the user visiting the sites.
    • iii. Butterfly Learnings will implement policy guidelines to safeguard the privacy of the user identifiable information from unauthorized access or improper use, and will continue to enhance security procedures as new technology becomes available.
    • iv. Butterfly Learnings honour requests from user to review all personally identifiable information maintained in reasonably retrievable form, which currently consists of the employee’s name, address, e-mail address, telephone number and will correct any such information which may be inaccurate. Users may verify that appropriate corrections have been made.
    • v. Butterfly Learnings may use user identifiable information to investigate and help prevent potentially unlawful activity or activity that threatens the network or otherwise violates the user agreement for that service
    • vi. All kinds of data such as personally identifiable information shared by users shall be:
      • 1. Processed fairly, lawfully and securely
      • 2. Processed in relation to the purpose for which it is collected
      • 3. Maintained up to date and accurate as necessary
      • 4. Retained for no longer than is necessary for the purpose for which it is collected
      • 5. Users shall be provided with at least the following information before collecting personally identifiable information
      • 6. Purposes of processing the information
      • 7. Any further information regarding the specific circumstances in which personal information is collected, such as:
        • · The recipients of the information
        • · Whether submission of information is obligatory or voluntary, as well as the impact of failure to submit such information
        • · The existence of the right to access, update or remove personal information
        • · Whether personal information will be used for marketing purpose
Policy Violations

Violation of the policy will result in corrective action from the management. Disciplinary action will be consistent with the severity of the incident, as determined by the investigation, and may include, but not limited to

  • · Loss of access privileges to information assets
  • · Termination of employment or contract
  • · Other actions deemed appropriate by management, HR division, Legal division and their relevant policies

Violation or deviation of the policy shall be reported to the service desk and a security incident record has to be created for the further investigation of the incident.