Trust & Privacy

Data Protection
at CompleteDigi

We treat your data with the same rigour we bring to engineering — privacy by design, security by default, transparency always.

GDPR
Compliant Processing
DPDPA
India Compliant
AES-256
Data Encryption
72h
Breach Notification SLA

Frameworks We Comply With

Our data protection practices align with major global privacy regulations and standards.

đŸ‡ĒđŸ‡ē

GDPR

EU General Data Protection Regulation — full compliance for EU/EEA data subjects including lawful basis documentation and DPA agreements

đŸ‡ŽđŸ‡ŗ

India DPDPA 2023

Digital Personal Data Protection Act — data principal rights, consent framework, and data fiduciary obligations

đŸĨ

HIPAA

Health Insurance Portability and Accountability Act — for healthcare client engagements involving PHI/ePHI

đŸ’ŗ

PCI DSS

Payment Card Industry Data Security Standard — for projects handling cardholder data in fintech and e-commerce

🔒

ISO 27001

International information security management standard — our infrastructure and processes are aligned to ISO 27001 controls

✅

SOC 2 Type II

Trust Service Criteria for security, availability, and confidentiality — our cloud operations are SOC 2 compliant via AWS and GCP

Our Data Protection Principles

Seven foundational principles that govern how we handle personal and client data.

1

Lawfulness, Fairness, and Transparency

We only process personal data where we have a valid legal basis (consent, contract, legal obligation, or legitimate interest), and we are always transparent about what data we hold and why.

2

Purpose Limitation

Personal data is collected for specified, explicit, and legitimate purposes. We never use it in ways incompatible with those purposes.

3

Data Minimisation

We collect only the data that is necessary for the stated purpose. If a project can be delivered with less data, we use less data.

4

Accuracy

We take reasonable steps to keep personal data accurate and up to date. Data subjects can request correction of inaccurate records at any time.

5

Storage Limitation

We retain personal data only for as long as necessary and have documented retention schedules for all data categories. Data is securely deleted or anonymised when retention periods expire.

6

Integrity and Confidentiality

We use AES-256 encryption at rest, TLS 1.3 in transit, strict access controls, and regular security audits to protect data against unauthorised access, loss, or destruction.

7

Accountability

We maintain records of processing activities, conduct Data Protection Impact Assessments (DPIAs) for high-risk processing, and appoint a Data Protection contact for all privacy queries.

Data Subject Rights

As a data subject, you have the following rights over your personal information. We respond to all requests within 30 days.

đŸ‘ī¸

Access

Request a copy of the personal data we hold about you

âœī¸

Rectification

Request correction of inaccurate or incomplete data

đŸ—‘ī¸

Erasure

Request deletion of your data where no legal basis for retention exists

đŸ“Ļ

Portability

Receive your data in a structured, machine-readable format

đŸšĢ

Objection

Object to processing based on legitimate interests or direct marketing

â¸ī¸

Restriction

Request that we limit processing in certain circumstances

â†Šī¸

Withdraw Consent

Withdraw consent for consent-based processing at any time

đŸ›ī¸

Complaint

Lodge a complaint with your national data protection authority

Technical Safeguards

The technical and organisational measures we use to protect your data.

🔐

Encryption

AES-256 encryption at rest for all stored data. TLS 1.3 for all data in transit. Encrypted backups with offsite storage.

đŸŽ¯

Access Controls

Role-based access (RBAC) with least privilege. Multi-factor authentication enforced for all team members. Privileged access reviews quarterly.

🔍

Security Auditing

Annual penetration testing by independent security firms. Continuous vulnerability scanning. SIEM-based threat monitoring.

💾

Data Backups

Automated daily backups with 30-day retention. Cross-region replication. RTO < 4 hours, RPO < 1 hour for critical systems.

đŸ—‚ī¸

Data Classification

All data classified as Public, Internal, Confidential, or Restricted. Handling procedures defined for each classification level.

📋

Incident Response

Documented data breach response plan. Breach notification within 72 hours to regulators. Affected individuals notified without undue delay.

Questions About Your Data?

Contact our data protection team for any privacy requests, DPA agreements, or compliance questions.