What Types of Data Are Collected?

  • User Data: We collect basic user information such as name, email address, and the branch where the user is employed. This helps us identify users and provide tailored services.
  • Location Data: Real-time location data is collected during inspections to verify whether users are present at the inspection site. This ensures accuracy and transparency in the inspection process.
  • Photos and Videos: Users may upload photos and videos during inspections to support documentation and reporting. These files are securely stored and used solely for inspection purposes.
  • Device Information: Technical details such as device model, operating system, and other metadata are collected to improve the performance and compatibility of the application.
  • Inspection Data: All data collected during inspections, including answers to questions and notes, is stored to generate detailed reports and analytics.

How Is the Data Used?

  • Optimizing Processes: Data collected during inspections is analyzed to improve organizational workflows and enhance decision-making processes.
  • Reporting: Inspection results are processed into detailed reports, which users can access and use to address operational inefficiencies or compliance issues.
  • Real-Time Location Verification: Location data is used to confirm user presence during inspections, adding a layer of accountability and accuracy.
  • User Support: Device and technical data help us troubleshoot issues and improve the overall user experience.
  • Data-Driven Insights: The information collected is aggregated (where applicable) to provide organizations with actionable insights into their operations.

How Is the Data Stored?

  • Data is securely stored on encrypted servers located in Turkey to ensure compliance with local and international data protection regulations.
  • Regular backups are performed to prevent data loss, and advanced access controls ensure that only authorized personnel can access sensitive information.
  • All files, including photos and videos, are stored in encrypted formats to safeguard against unauthorized access.

Who Is the Data Shared With?

  • No Third-Party Sharing: User data is not shared with any third parties, including advertisers or external service providers.
  • No Government Sharing: Data is not shared with government entities unless required by law or court order.
  • Internal Use Only: Data is used solely within the application ecosystem to improve services and deliver the intended functionality.

What Are User Rights?

  • Access: Users have the right to view the data associated with their account through the web application.
  • Modification: Users can update or correct their personal information to ensure it remains accurate.
  • Deletion: Users can request to delete specific data or their entire account if they no longer wish to use the service.
  • Restriction: Users may restrict the processing of their data under certain conditions as outlined by applicable privacy laws.
  • Portability: Users can request a copy of their data in a portable format.

Children’s Data Policies

  • This application is strictly designed for use by adults in a professional setting and is not intended for children under the age of 18. We do not knowingly collect, store, or process data from minors.

Cookies and Tracking Technologies

  • No Cookies Used: The application does not use cookies for tracking or advertising purposes.
  • Session Management: Temporary session data may be stored to enhance user experience but is deleted after logout or inactivity.
  • No Third-Party Tracking: The application does not integrate with third-party tracking tools or services.

What Security Measures Are in Place?

  • Data Encryption: All data is encrypted in transit and at rest to ensure the highest level of security.
  • Access Controls: Strict access policies are enforced, limiting data access to authorized personnel only.
  • Regular Audits: Security protocols and systems are routinely audited to identify and address vulnerabilities.
  • Breach Notification: In the event of a data breach, users will be notified promptly via email at kvkk@yesim.com and provided with detailed guidance on protective measures.

Policy Changes

  • We reserve the right to update this privacy policy as needed to reflect changes in our practices or legal requirements.
  • Users will be notified of any significant updates via email, and the revised policy will be made available on our website and within the application.

Contact Information


Application Owner

  • Company Name: ALMAXTEX TEKSTİL SANAYİ VE TİCARET ANONİM ŞİRKETİ