Updated 10 February 2026
1. Introduction
We are committed to safeguarding the confidentiality, integrity, and availability of all information entrusted to us by our clients, website visitors, partners, and stakeholders. Information security is a core component of our professional responsibility, particularly in the delivery of audit, tax, accounting, advisory, certification consultancy, ISO/IMS audits, project reporting, and tender-related services.
This Privacy Policy and Information Security Commitment explains how information is collected, processed, stored, protected, disclosed, retained, and disposed of, in compliance with applicable laws, professional standards, and information security best practices aligned with ISO/IEC 27001.
By accessing our website or engaging our services, you acknowledge and agree to the practices described in this policy.
2. Scope and Applicability
This policy applies to:
- All visitors accessing our website
- Clients and prospective clients
- Employees, consultants, and authorized representatives
- Vendors, service providers, and business partners
- All information processed in physical, electronic, or verbal form
This policy covers information processed across all services, including audits, taxation, accounting, advisory, business incorporation, ISO certification consultancy, IMS audits, project reports, and tender submissions.
3. Information We Collect
3.1 Personal Information
We may collect personal information including but not limited to:
- Name, designation, organization name
- Contact details (email address, phone number, postal address)
- Identification information required for statutory or regulatory purposes
3.2 Business, Financial, and Confidential Information
Depending on the nature of engagement, we may process:
- Company incorporation and statutory records
- Financial statements, accounting records, and audit documentation
- Income tax, GST, and compliance-related information
- ISO certification, IMS audit, and management system documents
- Project reports, feasibility studies, and tender documentation
- Contracts, agreements, and regulatory correspondence
3.3 Technical and Website Usage Information
When users visit our website, we may automatically collect:
- IP address and browser type
- Device and operating system information
- Website access logs and interaction data
4. Lawful Basis and Purpose of Processing
Information is collected and processed strictly for lawful, legitimate, and defined purposes, including:
- Delivery of professional services and contractual obligations
- Compliance with statutory, regulatory, and professional requirements
- Business incorporation, filings, and regulatory submissions
- ISO certification consultancy and management system audits
- Project evaluation, reporting, and tender submission support
- Client communication and service improvement
- Risk management, dispute resolution, and legal compliance
We adhere to the principle of data minimization, collecting only the information necessary for the intended purpose.
5. Information Security Framework (ISO 27001 Alignment)
We implement a structured Information Security Management framework aligned with ISO/IEC 27001, based on risk assessment and continual improvement.
5.1 Confidentiality
- Access to information is restricted to authorized personnel
- Role-based and need-to-know access controls are enforced
- Confidentiality obligations apply to all staff and partners
5.2 Integrity
- Controls are in place to prevent unauthorized modification, deletion, or corruption of information
- Validation and review mechanisms ensure accuracy and completeness
5.3 Availability
- Information is made available to authorized users when required
- Operational controls ensure continuity of service and data accessibility
6. Confidentiality and Professional Ethics
We adhere to strict professional ethics and confidentiality obligations applicable to audit, tax, advisory, and consultancy services. All information received from clients is treated as confidential, regardless of format or medium.
Employees, consultants, and third parties are bound by:
- Confidentiality agreements
- Professional codes of conduct
- Internal information security policies
7. Access Control and Authorization
Access to information is managed through:
- Defined user roles and responsibilities
- Authorization mechanisms based on job function
- Periodic access reviews and revocation where necessary
Unauthorized access, disclosure, or misuse of information is strictly prohibited.
8. Information Sharing and Disclosure
We do not sell, rent, or trade personal or business information.
Information may be disclosed only:
- To statutory authorities, regulators, or certification bodies when legally required
- To auditors, consultants, or service providers under confidentiality obligations
- To comply with court orders or lawful requests
All disclosures are limited to the minimum necessary information and protected by appropriate safeguards.
9. Data Security Measures
We implement reasonable and appropriate security measures, including:
- Administrative controls (policies, procedures, training)
- Technical controls (restricted access, secure systems)
- Physical controls (controlled access to premises and records)
Security controls are reviewed periodically to address emerging risks and changes in operations.
10. Data Retention and Secure Disposal
Information is retained only as long as required to:
- Fulfill contractual and professional obligations
- Comply with statutory record retention requirements
- Support audits, legal proceedings, or dispute resolution
Upon expiry of retention periods, information is securely deleted, destroyed, or anonymized using appropriate methods.
11. Cookies and Website Analytics
Our website may use cookies to:
- Enhance user experience and website functionality
- Analyse website traffic and usage trends
Cookies do not collect sensitive personal information unless explicitly provided. Users may manage cookie preferences through browser settings.
12. Data Subject Rights
Where applicable, individuals may:
- Request access to their personal information
- Request correction of inaccurate or incomplete data
- Request deletion of personal data, subject to legal obligations
- Withdraw consent for non-essential data processing
Requests are handled securely and in accordance with applicable laws.
13. Third-Party Websites
Our website may contain links to external websites. We are not responsible for the privacy or information security practices of third-party websites. Users are encouraged to review third-party policies independently.
14. Information Security Incident Management
We maintain defined procedures to manage information security incidents, including:
- Identification and reporting of incidents
- Containment and impact assessment
- Corrective and preventive actions
- Legal or regulatory notification where required
Incidents are reviewed to prevent recurrence and improve controls.
15. Policy Review and Updates
This policy is reviewed periodically and updated as necessary to reflect:
- Legal and regulatory changes
- ISO 27001 requirements
- Changes in business operations or services
Updated versions will be published on our website.
16. Contact Information
For questions, concerns, or requests regarding privacy or information security, please contact us using the details provided on our website.
17. Our Commitment
We recognize that information security and privacy are fundamental to trust. We are committed to maintaining robust information security controls, professional confidentiality, and regulatory compliance, aligned with ISO/IEC 27001 principles, across all our services.