Skip links

Privacy Terms and Conditions

Privacy Terms and Conditions

We, at RedMarker Systems are committed to provide data security and data privacy.

As we provide solutions and services for examination and assessments, your data privacy is important to us and to our clients. This terms and conditions explain how we process, save and share the data that we collect from you or that is provided by you.

Please read the following carefully to understand our privacy statement regarding your personal data and how we will use it. By visiting or using any of RedMarker Systems’ services, you are accepting and consenting to our terms and conditions.

Why we collect personal data?

Personal data is a diversified concept and includes a wide range of personal information, such as name, email address, mailing address, and IP addresses etc.

We collect your personal data to deliver our information and services and provide you with the best experience with RedMarker Systems.

We depend upon the following legal basis for processing the personal data we collect from you when providing you with access to the website and services:

  • Our legalized business requirements
  • To fulfil our contract-based obligations to you
  • To observe our legal obligations

Before accessing and processing your information, we ask for your consent before-hand.

What personal data we collect from you

You may give us your personal information by filling in forms on our website or by connecting with us by phone, email, or our social media. This includes information you provide when you get registered to use our website, subscribe to our services, or newsletter, search for a product, place an order on our website, participate in events or other social media handles on our website, promotion, or survey, and when you report a problem with our website or services.

Maintenance of Industry Standards & Data Security features

RedMarker Systems has developed all its software solutions by ensuring industry standards as well as implementing international best practices. All our solutions are secure from cyber and other threats as under mentioned mechanisms and tools are employed

  • Secure Application Frameworks by using Django Python Framework and Quasar Vue/Js Framework
  • HTTPS/SSL Secure site
  • SQL Injection Protection
  • Cross-Site Scripting (XSS) protection
  • Cross-Site Request Forgery (CSRF) Protection
  • Clickjacking (X-Frame-Options) Protection
  • File/Content Upload Limit
  • Throttling Policy for Brute Force Protection
  • Secure login via Keyclock

To further improve the security and reliability of our solutions, automated backups are taken at regular intervals to ensure minimum data loss in case of human error, software corruption, computer viruses, hardware damage, etc.

Security

Our business model is based upon safeguarding integrity, confidentiality and security of every product or service we provide to our clients. For this purpose, we have ensured that our products are developed in an absolute secure environment, with strict access hierarchy that cannot be overruled. We have worked tirelessly with our team to embed proven security protocols in our products that have been tested and proven to be reliable and secure.

  • Secure Client Access
  • Our client portals are password protected with access rights that we mutually agree with our clients. User access is also managed through multi-factor authentication control mechanism. Our clients get ‘always-on’ 24×7 secure access to our services and data as required.

  • Human Resource
  • We are committed to provide accurate results through our services and for this purpose, we have robust vetting processes to hire personnel who are regularly updated and trained on security protocols within the organization. We make sure all personnel working for us fits the job role and is well aware of the security of our products and services alike.

    Our registered e-markers go through a rigorous screening process to ensure we have eligible e-markers who are provided with regular training on our products. E-markers use internet access for any on-screen marking of answer scripts on our platforms that provides them secured 24×7 access. We also have an in-house, high-tech scanning facility that allows us to scan all documentation with high quality which is easily readable for e-markers. All data pertaining to e-marking assessments is archived and available for audit trail as per the client requirements.

  • Storage and archiving
  • All digital copies of any relevant documentation are encrypted and securely stored at our server locations. We also provide archiving facility for associated hard copies for a maximum period of five years after which, with client’s consent, these can be shredded. We provide the space and security of such processes if required.