What Types of Data Are Collected?
- User Data: We collect basic user information such as name, email address, and the branch where the user is employed. This helps us identify users and provide tailored services.
- Location Data: Real-time location data is collected during inspections to verify whether users are present at the inspection site. This ensures accuracy and transparency in the inspection process.
- Photos and Videos: Users may upload photos and videos during inspections to support documentation and reporting. These files are securely stored and used solely for inspection purposes.
- Device Information: Technical details such as device model, operating system, and other metadata are collected to improve the performance and compatibility of the application.
- Inspection Data: All data collected during inspections, including answers to questions and notes, is stored to generate detailed reports and analytics.
How Is the Data Used?
- Optimizing Processes: Data collected during inspections is analyzed to improve organizational workflows and enhance decision-making processes.
- Reporting: Inspection results are processed into detailed reports, which users can access and use to address operational inefficiencies or compliance issues.
- Real-Time Location Verification: Location data is used to confirm user presence during inspections, adding a layer of accountability and accuracy.
- User Support: Device and technical data help us troubleshoot issues and improve the overall user experience.
- Data-Driven Insights: The information collected is aggregated (where applicable) to provide organizations with actionable insights into their operations.
How Is the Data Stored?
- Data is securely stored on encrypted servers located in Turkey to ensure compliance with local and international data protection regulations.
- Regular backups are performed to prevent data loss, and advanced access controls ensure that only authorized personnel can access sensitive information.
- All files, including photos and videos, are stored in encrypted formats to safeguard against unauthorized access.
Who Is the Data Shared With?
- No Third-Party Sharing: User data is not shared with any third parties, including advertisers or external service providers.
- No Government Sharing: Data is not shared with government entities unless required by law or court order.
- Internal Use Only: Data is used solely within the application ecosystem to improve services and deliver the intended functionality.
What Are User Rights?
- Access: Users have the right to view the data associated with their account through the web application.
- Modification: Users can update or correct their personal information to ensure it remains accurate.
- Deletion: Users can request to delete specific data or their entire account if they no longer wish to use the service.
- Restriction: Users may restrict the processing of their data under certain conditions as outlined by applicable privacy laws.
- Portability: Users can request a copy of their data in a portable format.
Children’s Data Policies
- This application is strictly designed for use by adults in a professional setting and is not intended for children under the age of 18. We do not knowingly collect, store, or process data from minors.
Cookies and Tracking Technologies
- No Cookies Used: The application does not use cookies for tracking or advertising purposes.
- Session Management: Temporary session data may be stored to enhance user experience but is deleted after logout or inactivity.
- No Third-Party Tracking: The application does not integrate with third-party tracking tools or services.
What Security Measures Are in Place?
- Data Encryption: All data is encrypted in transit and at rest to ensure the highest level of security.
- Access Controls: Strict access policies are enforced, limiting data access to authorized personnel only.
- Regular Audits: Security protocols and systems are routinely audited to identify and address vulnerabilities.
- Breach Notification: In the event of a data breach, users will be notified promptly via email at kvkk@yesim.com and provided with detailed guidance on protective measures.
Policy Changes
- We reserve the right to update this privacy policy as needed to reflect changes in our practices or legal requirements.
- Users will be notified of any significant updates via email, and the revised policy will be made available on our website and within the application.
Contact Information
Application Owner
- Company Name: ALMAXTEX TEKSTİL SANAYİ VE TİCARET ANONİM ŞİRKETİ