1:"$Sreact.fragment" 2:I[4970,[],"ClientSegmentRoot"] 3:I[328,["874","static/chunks/874-8179e1aff5ec9a87.js","766","static/chunks/766-88cba2556eb967be.js","946","static/chunks/946-98cf85e8eaddd93f.js","177","static/chunks/app/layout-3d0363b058443a76.js"],"default"] 4:I[7555,[],""] 5:I[1295,[],""] 7:I[6874,["874","static/chunks/874-8179e1aff5ec9a87.js","548","static/chunks/app/(Components)/(main)/(Quiklinks)/GDRP/page-dec3594bf5459df2.js"],""] 8:I[9665,[],"OutletBoundary"] b:I[4911,[],"AsyncMetadataOutlet"] d:I[9665,[],"ViewportBoundary"] f:I[9665,[],"MetadataBoundary"] 11:I[6614,[],""] :HL["/_next/static/css/991efdcd1ebedf92.css","style"] :HL["/_next/static/css/ef46db3751d8e999.css","style"] :HL["/_next/static/css/0fcd4f902b4eca58.css","style"] 0:{"P":null,"b":"_D2urxF4OMzoHuc_3Y31M","p":"","c":["","GDRP"],"i":false,"f":[[["",{"children":["(Components)",{"children":["(main)",{"children":["(Quiklinks)",{"children":["GDRP",{"children":["__PAGE__",{}]}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/991efdcd1ebedf92.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/ef46db3751d8e999.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L2",null,{"Component":"$3","slots":{"children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]},"params":{},"promise":"$@6"}]]}],{"children":["(Components)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:style","children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:1:props:style","children":404}],["$","div",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:2:props:style","children":["$","h2",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:2:props:children:props:style","children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["(main)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["(Quiklinks)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["GDRP",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"main_Container p-5","children":[["$","h2",null,{"children":["$","strong",null,{"children":"GENERAL DATA PROTECTION REGULATION (GDPR) COMPLIANCE POLICY"}]}],["$","p",null,{"children":[["$","strong",null,{"children":"ChatWet Application"}],["$","br",null,{}],"Operated by Omkaar Group"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Effective Date:"}]," [Insert Date]",["$","br",null,{}],["$","strong",null,{"children":"Last Updated:"}]," [Insert Date]",["$","br",null,{}],["$","strong",null,{"children":"Version:"}]," 1.0"]}],["$","h3",null,{"children":["$","strong",null,{"children":"ARTICLE I - REGULATORY FRAMEWORK AND SCOPE"}]}],["$","h3",null,{"children":"1.1 Legal Authority and Application"}],["$","p",null,{"children":"This GDPR Compliance Policy governs the processing of personal data of individuals located in the European Union (EU) and European Economic Area (EEA) by Omkaar Group (“Company,” “Controller,” “we,” “us,” or “our”) through the ChatWet application (“Service,” “Platform,” or “Application”)."}],["$","h3",null,{"children":"1.2 Regulatory Compliance Framework"}],["$","p",null,{"children":[["$","strong",null,{"children":"Primary Regulation:"}]," Regulation (EU) 2016/679 - General Data Protection Regulation"]}],["$","p",null,{"children":["$","strong",null,{"children":"Supplementary Laws:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"ePrivacy Directive (2002/58/EC) and national implementations"}],["$","li",null,{"children":"Data Protection Act 2018 (United Kingdom)"}],["$","li",null,{"children":"National data protection laws of EU member states"}],["$","li",null,{"children":"Adequacy decisions and international transfer frameworks"}],["$","li",null,{"children":"European Data Protection Board (EDPB) guidelines and decisions"}]]}],["$","h3",null,{"children":"1.3 Territorial Scope (Article 3 GDPR)"}],["$","p",null,{"children":"This policy applies when:"}],["$","ul",null,{"children":[["$","li",null,{"children":"EU/EEA residents use ChatWet services regardless of processing location"}],["$","li",null,{"children":"Processing activities occur within the EU/EEA"}],["$","li",null,{"children":"Goods or services are offered to EU/EEA data subjects"}],["$","li",null,{"children":"Behavioral monitoring of EU/EEA data subjects occurs"}],["$","li",null,{"children":"Cross-border data processing involves EU/EEA personal data"}]]}],["$","h3",null,{"children":"1.4 Controller and Representative Information"}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Controller:"}]," Omkaar Group",["$","br",null,{}],["$","strong",null,{"children":"Registered Office:"}]," Office No. 102, 1st Floor, Rituraj Business Park, Bicholi Mardana Road, near UNO Business Park, Indore, Deoguradia, Madhya Pradesh 452016, India"]}],["$","p",null,{"children":[["$","strong",null,{"children":"EU Representative (Article 27 GDPR):"}],["$","br",null,{}],"Name: [To be appointed]",["$","br",null,{}],"Address: [EU address to be provided]",["$","br",null,{}],"Email: eu-representative@chatwet.com",["$","br",null,{}],"Phone: [EU contact number]"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Protection Officer (Article 37 GDPR):"}],["$","br",null,{}],"Name: [To be designated]",["$","br",null,{}],"Email: dpo@chatwet.com",["$","br",null,{}],"Phone: [Direct line to be provided]"]}],["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE II - LAWFUL BASIS FOR PROCESSING (ARTICLE 6 GDPR)"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.1 Processing Purposes and Legal Bases"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.1.1 Contract Performance (Article 6(1)(b))"}]}],["$","p",null,{"children":["$","strong",null,{"children":"Service Provision:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"User account creation and authentication"}],["$","li",null,{"children":"Profile matching and recommendation services"}],["$","li",null,{"children":"Communication facilitation (chat, voice, video calls)"}],["$","li",null,{"children":"Payment processing and subscription management"}],["$","li",null,{"children":"Customer support and technical assistance"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Contractual Obligations:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Identity verification and KYC compliance"}],["$","li",null,{"children":"Platform security and fraud prevention"}],["$","li",null,{"children":"Service delivery and feature access"}],["$","li",null,{"children":"Billing and payment processing"}],["$","li",null,{"children":"Terms and conditions enforcement"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.1.2 Legitimate Interests (Article 6(1)(f))"}]}],["$","p",null,{"children":["$","strong",null,{"children":"Platform Operations:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Service improvement and optimization"}],["$","li",null,{"children":"User experience personalization"}],["$","li",null,{"children":"Technical system administration"}],["$","li",null,{"children":"Business analytics and performance measurement"}],["$","li",null,{"children":"Marketing and promotional communications (with opt-out)"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Security and Safety:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Fraud detection and prevention"}],["$","li",null,{"children":"Platform security monitoring"}],["$","li",null,{"children":"Abuse prevention and user safety"}],["$","li",null,{"children":"Content moderation and community protection"}],["$","li",null,{"children":"Technical troubleshooting and support"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.1.3 Consent (Article 6(1)(a))"}]}],["$","p",null,{"children":["$","strong",null,{"children":"Explicit Consent Required For:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Marketing communications and newsletters"}],["$","li",null,{"children":"Non-essential cookies and tracking technologies"}],["$","li",null,{"children":"Precise location tracking beyond basic matching"}],["$","li",null,{"children":"Biometric data processing for enhanced verification"}],["$","li",null,{"children":"Data sharing with third parties for marketing purposes"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Consent Management:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Clear, specific, and informed consent requests"}],["$","li",null,{"children":"Granular consent options for different processing purposes"}],["$","li",null,{"children":"Easy withdrawal mechanisms with same ease as giving consent"}],["$","li",null,{"children":"Regular consent renewal for ongoing processing"}],["$","li",null,{"children":"Documentation of consent with timestamps and scope"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.1.4 Legal Obligation (Article 6(1)(c))"}]}],["$","p",null,{"children":["$","strong",null,{"children":"Regulatory Compliance:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Anti-money laundering (AML) and KYC requirements"}],["$","li",null,{"children":"Age verification for platform access"}],["$","li",null,{"children":"Financial transaction reporting"}],["$","li",null,{"children":"Data breach notification obligations"}],["$","li",null,{"children":"Law enforcement cooperation requirements"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.2 Special Categories of Personal Data (Article 9 GDPR)"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.2.1 Explicit Consent for Special Categories"}]}],["$","p",null,{"children":["$","strong",null,{"children":"Sexual Orientation and Preferences:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Explicit consent for sexual orientation data processing"}],["$","li",null,{"children":"Clear explanation of processing purposes"}],["$","li",null,{"children":"Granular control over preference visibility"}],["$","li",null,{"children":"Easy withdrawal of consent with continued service access"}],["$","li",null,{"children":"Separate consent from general terms acceptance"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Biometric Data Processing:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Explicit consent for facial recognition and voice analysis"}],["$","li",null,{"children":"Clear explanation of verification purposes"}],["$","li",null,{"children":"Alternative verification methods offered"}],["$","li",null,{"children":"Secure processing and storage procedures"}],["$","li",null,{"children":"Regular deletion schedules for biometric templates"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"2.2.2 Safeguards for Special Categories"}]}],["$","p",null,{"children":["$","strong",null,{"children":"Enhanced Protection Measures:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Encryption of special category data at rest and in transit"}],["$","li",null,{"children":"Access controls limited to authorized personnel only"}],["$","li",null,{"children":"Regular audit and monitoring of special category processing"}],["$","li",null,{"children":"Enhanced user controls and transparency measures"}],["$","li",null,{"children":"Strict data minimization and purpose limitation"}]]}],["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE III - DATA SUBJECT RIGHTS (CHAPTER III GDPR)"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.1 Right to Information (Articles 13-14 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.1.1 Transparency Information Provision"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Identity and contact details of controller and DPO"}],["$","li",null,{"children":"Purposes and legal basis for each processing activity"}],["$","li",null,{"children":"Legitimate interests where applicable"}],["$","li",null,{"children":"Recipients or categories of recipients"}],["$","li",null,{"children":"International transfer details and safeguards"}],["$","li",null,{"children":"Retention periods for each data category"}],["$","li",null,{"children":"Data subject rights and exercise procedures"}],["$","li",null,{"children":"Right to withdraw consent where applicable"}],["$","li",null,{"children":"Right to lodge complaints with supervisory authorities"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.1.2 Layered Privacy Information"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Essential information prominently displayed"}],["$","li",null,{"children":"Detailed information accessible through links"}],["$","li",null,{"children":"Context-specific privacy notices for different features"}],["$","li",null,{"children":"Regular updates and change notifications"}],["$","li",null,{"children":"Multi-language availability for EU languages"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.2 Right of Access (Article 15 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.2.1 Access Request Processing"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Confirmation of personal data processing"}],["$","li",null,{"children":"Copy of personal data undergoing processing"}],["$","li",null,{"children":"Processing purposes and legal basis"}],["$","li",null,{"children":"Categories of personal data processed"}],["$","li",null,{"children":"Recipients of personal data"}],["$","li",null,{"children":"Retention periods or criteria for determination"}],["$","li",null,{"children":"Data subject rights information"}],["$","li",null,{"children":"Source of data if not collected from data subject"}],["$","li",null,{"children":"Existence of automated decision-making and logic involved"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.2.2 Access Request Procedures"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Identity verification procedures for security"}],["$","li",null,{"children":"Response timeline: One month (extendable to three months)"}],["$","li",null,{"children":"Free provision of first copy; reasonable fees for additional copies"}],["$","li",null,{"children":"Electronic format provision when requested"}],["$","li",null,{"children":"Restrictions only when affecting others’ rights and freedoms"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.3 Right to Rectification (Article 16 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.3.1 Data Correction Procedures"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Correction of inaccurate personal data"}],["$","li",null,{"children":"Completion of incomplete personal data"}],["$","li",null,{"children":"Update of outdated information"}],["$","li",null,{"children":"Correction of technical errors in data processing"}],["$","li",null,{"children":"Amendment of misleading or incorrect data"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.3.2 Verification and Implementation"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Verification of accuracy claims and supporting evidence"}],["$","li",null,{"children":"Identity confirmation for security purposes"}],["$","li",null,{"children":"Technical implementation within one month"}],["$","li",null,{"children":"Notification to third parties where data shared"}],["$","li",null,{"children":"Documentation of rectification activities"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.4 Right to Erasure (“Right to be Forgotten”) (Article 17 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.4.1 Erasure Grounds and Conditions"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Personal data no longer necessary for original processing purposes"}],["$","li",null,{"children":"Withdrawal of consent where consent was the lawful basis"}],["$","li",null,{"children":"Objection to processing with no overriding legitimate grounds"}],["$","li",null,{"children":"Personal data processed unlawfully"}],["$","li",null,{"children":"Erasure required for legal compliance"}],["$","li",null,{"children":"Data collected from children without proper consent"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.4.2 Erasure Exceptions and Limitations"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Freedom of expression and information"}],["$","li",null,{"children":"Legal compliance obligations"}],["$","li",null,{"children":"Public health interests"}],["$","li",null,{"children":"Archiving, research, or statistical purposes"}],["$","li",null,{"children":"Establishment, exercise, or defense of legal claims"}],["$","li",null,{"children":"Overriding legitimate interests of controller"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.4.3 Technical Erasure Implementation"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Secure deletion from live production systems"}],["$","li",null,{"children":"Backup system deletion within reasonable timeframe"}],["$","li",null,{"children":"Third-party notification for shared data"}],["$","li",null,{"children":"Verification of complete data removal"}],["$","li",null,{"children":"Certificate of destruction for sensitive data"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.5 Right to Restriction (Article 18 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.5.1 Restriction Circumstances"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Disputed accuracy pending verification"}],["$","li",null,{"children":"Unlawful processing where user opposes deletion"}],["$","li",null,{"children":"Data no longer needed but required for legal claims"}],["$","li",null,{"children":"Pending verification of legitimate grounds for objection"}],["$","li",null,{"children":"Technical issues preventing immediate deletion"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.5.2 Restriction Implementation"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Storage permitted with limited access"}],["$","li",null,{"children":"Processing only with data subject consent"}],["$","li",null,{"children":"Processing for legal claims establishment or defense"}],["$","li",null,{"children":"Processing for protection of third party rights"}],["$","li",null,{"children":"Clear marking of restricted data in systems"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.6 Right to Data Portability (Article 20 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.6.1 Portability Scope and Format"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Data provided directly by data subject"}],["$","li",null,{"children":"Data generated through service use"}],["$","li",null,{"children":"Profile information and preferences"}],["$","li",null,{"children":"Communication history and interactions"}],["$","li",null,{"children":"Transaction and payment history"}],["$","li",null,{"children":"Usage analytics and behavioral data"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Technical Format Requirements:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Structured, commonly used, machine-readable format"}],["$","li",null,{"children":"JSON, CSV, or XML formats as appropriate"}],["$","li",null,{"children":"Documentation explaining data structure and fields"}],["$","li",null,{"children":"Secure download mechanisms with authentication"}],["$","li",null,{"children":"Reasonable file size limitations for large datasets"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.6.2 Direct Transmission to Other Controllers"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Technical feasibility assessment for direct transmission"}],["$","li",null,{"children":"Secure transfer protocols implementation"}],["$","li",null,{"children":"Data format standardization where possible"}],["$","li",null,{"children":"Third-party controller verification procedures"}],["$","li",null,{"children":"User notification of transmission completion"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.7 Right to Object (Article 21 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.7.1 Objection Grounds and Processing"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Processing based on legitimate interests (Article 6(1)(f))"}],["$","li",null,{"children":"Processing for direct marketing purposes"}],["$","li",null,{"children":"Processing for research or statistical purposes"}],["$","li",null,{"children":"Automated decision-making and profiling"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.7.2 Compelling Legitimate Grounds Assessment"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Overriding legitimate interests of controller"}],["$","li",null,{"children":"Necessity for establishment, exercise, or defense of legal claims"}],["$","li",null,{"children":"Vital interests of data subject or others"}],["$","li",null,{"children":"Important public interest grounds"}],["$","li",null,{"children":"Balancing test documentation and justification"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"3.8 Automated Decision-Making and Profiling (Article 22 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.8.1 Automated Decision Scope"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Matching algorithm automated decisions"}],["$","li",null,{"children":"Content moderation automated filtering"}],["$","li",null,{"children":"Fraud detection automated blocking"}],["$","li",null,{"children":"Pricing and feature access automation"}],["$","li",null,{"children":"Risk assessment automated determinations"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"3.8.2 Safeguards and Human Intervention"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Right to obtain human intervention"}],["$","li",null,{"children":"Right to express point of view"}],["$","li",null,{"children":"Right to contest automated decision"}],["$","li",null,{"children":"Clear explanation of decision logic"}],["$","li",null,{"children":"Regular algorithm auditing and bias testing"}]]}],["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE IV - INTERNATIONAL DATA TRANSFERS (CHAPTER V GDPR)"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"4.1 Transfer Mechanisms and Safeguards"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"4.1.1 Adequacy Decisions (Article 45 GDPR)"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Monitoring of European Commission adequacy decisions"}],["$","li",null,{"children":"Regular assessment of adequacy status changes"}],["$","li",null,{"children":"Documentation of adequacy-based transfers"}],["$","li",null,{"children":"Alternative safeguard preparation for status changes"}],["$","li",null,{"children":"Impact assessment for adequacy withdrawals"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"4.1.2 Standard Contractual Clauses (Articles 46-47 GDPR)"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"European Commission approved SCC 2021/914 implementation"}],["$","li",null,{"children":"Supplementary measures assessment and implementation"}],["$","li",null,{"children":"Regular effectiveness review and monitoring"}],["$","li",null,{"children":"Documentation of transfer impact assessments (TIAs)"}],["$","li",null,{"children":"Suspension procedures if safeguards become ineffective"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Supplementary Measures:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Technical measures: encryption, pseudonymization, data minimization"}],["$","li",null,{"children":"Organizational measures: access controls, staff training, audit procedures"}],["$","li",null,{"children":"Contractual measures: additional data protection clauses"}],["$","li",null,{"children":"Regular review and updates based on EDPB guidance"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"4.1.3 Transfer Impact Assessments (TIAs)"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Third country surveillance laws and government access"}],["$","li",null,{"children":"Legal remedies available to data subjects"}],["$","li",null,{"children":"Rule of law and independence of judiciary"}],["$","li",null,{"children":"International commitments and cooperation frameworks"}],["$","li",null,{"children":"Practical experience of data transfers"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Ongoing Monitoring:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Regular review of third country legal developments"}],["$","li",null,{"children":"Assessment of safeguard effectiveness"}],["$","li",null,{"children":"Documentation of monitoring activities"}],["$","li",null,{"children":"Incident response for safeguard failures"}],["$","li",null,{"children":"Suspension triggers and procedures"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"4.2 Specific Transfer Scenarios"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"4.2.1 Cloud Service Providers"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Data Processing Agreements (DPAs) with cloud providers"}],["$","li",null,{"children":"Technical and organizational measures specification"}],["$","li",null,{"children":"Data location controls and residency requirements"}],["$","li",null,{"children":"Encryption key management and control"}],["$","li",null,{"children":"Regular security audits and compliance verification"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"4.2.2 Business Partners and Vendors"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Due diligence assessment of transfer recipients"}],["$","li",null,{"children":"Contractual safeguards and data protection obligations"}],["$","li",null,{"children":"Regular monitoring of partner compliance"}],["$","li",null,{"children":"Incident notification and response procedures"}],["$","li",null,{"children":"Termination procedures for non-compliance"}]]}],["$","article",null,{"children":[["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE V - PRIVACY BY DESIGN AND BY DEFAULT (ARTICLE 25 GDPR)"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"5.1 Technical and Organizational Measures"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"5.1.1 Privacy by Design Implementation"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Data minimization built into system architecture"}],["$","li",null,{"children":"Purpose limitation enforced through technical controls"}],["$","li",null,{"children":"Storage limitation through automated deletion"}],["$","li",null,{"children":"Accuracy ensured through validation and correction tools"}],["$","li",null,{"children":"Security measures integrated into all processing operations"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"5.1.2 Privacy by Default Configuration"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Minimal data processing as default configuration"}],["$","li",null,{"children":"Opt-in rather than opt-out for non-essential processing"}],["$","li",null,{"children":"Restrictive privacy settings for new accounts"}],["$","li",null,{"children":"Clear user controls for privacy preference modification"}],["$","li",null,{"children":"Regular review and updates of default settings"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"5.2 Data Protection Impact Assessments (Article 35 GDPR)"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"5.2.1 DPIA Trigger Criteria"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Systematic and extensive automated processing with legal effects"}],["$","li",null,{"children":"Large scale processing of special categories of personal data"}],["$","li",null,{"children":"Systematic monitoring of publicly accessible areas"}],["$","li",null,{"children":"Use of new technologies with high privacy risks"}],["$","li",null,{"children":"Combining datasets that could affect data subject rights"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"5.2.2 DPIA Content and Process"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Description of processing operations and purposes"}],["$","li",null,{"children":"Assessment of necessity and proportionality"}],["$","li",null,{"children":"Risk identification and analysis for data subject rights"}],["$","li",null,{"children":"Measures to address risks and demonstrate compliance"}],["$","li",null,{"children":"Consultation with data subjects where appropriate"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Prior Consultation Requirements:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Supervisory authority consultation for high residual risks"}],["$","li",null,{"children":"Implementation delay pending authority guidance"}],["$","li",null,{"children":"Documentation of consultation outcomes"}],["$","li",null,{"children":"Incorporation of authority recommendations"}],["$","li",null,{"children":"Ongoing monitoring of implemented measures"}]]}]]}],["$","article",null,{"children":[["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE VI - SECURITY OF PROCESSING (ARTICLE 32 GDPR)"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"6.1 Technical Security Measures"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"6.1.1 Encryption and Data Protection"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"AES-256 encryption for data at rest"}],["$","li",null,{"children":"TLS 1.3 for data in transit"}],["$","li",null,{"children":"End-to-end encryption for private communications"}],["$","li",null,{"children":"Key management and rotation procedures"}],["$","li",null,{"children":"Regular encryption strength assessment"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"6.1.2 Access Controls and Authentication"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Role-based access control (RBAC) implementation"}],["$","li",null,{"children":"Multi-factor authentication for system access"}],["$","li",null,{"children":"Privileged access management (PAM) systems"}],["$","li",null,{"children":"Regular access reviews and deprovisioning"}],["$","li",null,{"children":"Audit logging of all data access activities"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"6.2 Organizational Security Measures"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"6.2.1 Staff Training and Awareness"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Mandatory GDPR training for all staff"}],["$","li",null,{"children":"Role-specific data protection training"}],["$","li",null,{"children":"Regular training updates and refreshers"}],["$","li",null,{"children":"Privacy awareness campaigns and communications"}],["$","li",null,{"children":"Competency testing and certification"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"6.2.2 Incident Response and Breach Management"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Incident detection and classification systems"}],["$","li",null,{"children":"72-hour supervisory authority notification procedures"}],["$","li",null,{"children":"Data subject notification for high-risk breaches"}],["$","li",null,{"children":"Forensic investigation and root cause analysis"}],["$","li",null,{"children":"Remedial action implementation and monitoring"}]]}]]}],["$","article",null,{"children":[["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE VII - SUPERVISORY AUTHORITY RELATIONS"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"7.1 Lead Supervisory Authority Determination"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"7.1.1 One-Stop-Shop Mechanism (Article 56 GDPR)"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Main establishment determination within EU"}],["$","li",null,{"children":"Cross-border processing activity assessment"}],["$","li",null,{"children":"Lead supervisory authority designation"}],["$","li",null,{"children":"Cooperation procedures with other authorities"}],["$","li",null,{"children":"Consistency mechanism application"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"7.1.2 Authority Cooperation and Communication"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Regular communication with lead supervisory authority"}],["$","li",null,{"children":"Cooperation in investigations and enforcement actions"}],["$","li",null,{"children":"Joint operation participation where appropriate"}],["$","li",null,{"children":"Information sharing for cross-border processing"}],["$","li",null,{"children":"Compliance verification and reporting"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"7.2 Compliance Monitoring and Auditing"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"7.2.1 Internal Compliance Programs"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Regular GDPR compliance assessments"}],["$","li",null,{"children":"Privacy policy and procedure updates"}],["$","li",null,{"children":"Data processing inventory maintenance"}],["$","li",null,{"children":"Risk assessment and mitigation planning"}],["$","li",null,{"children":"Employee training and competency development"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"7.2.2 External Audit and Certification"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Independent privacy audit engagement"}],["$","li",null,{"children":"Certification scheme participation where available"}],["$","li",null,{"children":"Compliance standard alignment (ISO 27001, etc.)"}],["$","li",null,{"children":"Regular audit report generation and review"}],["$","li",null,{"children":"Corrective action implementation and tracking"}]]}]]}],["$","article",null,{"children":[["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE VIII - DATA SUBJECT COMPLAINT PROCEDURES"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"8.1 Internal Complaint Resolution"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"8.1.1 Complaint Submission and Processing"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Online complaint form submission"}],["$","li",null,{"children":"Email submission to DPO"}],["$","li",null,{"children":"Postal mail complaint submission"}],["$","li",null,{"children":"In-app privacy complaint mechanism"}],["$","li",null,{"children":"Phone consultation for complex issues"}]]}],["$","p",null,{"children":["$","strong",null,{"children":"Processing Timeline:"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Acknowledgment within 48 hours"}],["$","li",null,{"children":"Investigation and response within 30 days"}],["$","li",null,{"children":"Extension notification if additional time needed"}],["$","li",null,{"children":"Final response with resolution or explanation"}],["$","li",null,{"children":"Escalation options for unsatisfied complainants"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"8.1.2 Resolution and Follow-up"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Detailed investigation of all complaint elements"}],["$","li",null,{"children":"Corrective action implementation where appropriate"}],["$","li",null,{"children":"Policy and procedure updates based on findings"}],["$","li",null,{"children":"Complainant notification of actions taken"}],["$","li",null,{"children":"Monitoring for complaint pattern identification"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"8.2 Supervisory Authority Complaints"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"8.2.1 Data Subject Rights (Article 77 GDPR)"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Information about supervisory authority complaint rights"}],["$","li",null,{"children":"Assistance with complaint preparation and submission"}],["$","li",null,{"children":"No prejudice to judicial remedies"}],["$","li",null,{"children":"Cooperation with supervisory authority investigations"}],["$","li",null,{"children":"Implementation of authority decisions and orders"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"8.2.2 Supervisory Authority Contact Information"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Lead Supervisory Authority: [To be determined based on main establishment]"}],["$","li",null,{"children":"EU Representative Authority: [To be determined based on representative location]"}],["$","li",null,{"children":["List of EU Supervisory Authorities: Available at ",["$","$L7",null,{"href":"https://edpb.europa.eu/about-edpb/board/members_en","children":"https://edpb.europa.eu/about-edpb/board/members_en"}]," "]}]]}]]}],["$","article",null,{"children":[["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE IX - POLICY UPDATES AND LEGAL CHANGES"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"9.1 Regulatory Development Monitoring"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"9.1.1 Legal Change Tracking"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"EDPB guidance and recommendation tracking"}],["$","li",null,{"children":"National data protection law developments"}],["$","li",null,{"children":"Court decision analysis and implementation"}],["$","li",null,{"children":"Regulatory enforcement trend analysis"}],["$","li",null,{"children":"Industry best practice development"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"9.1.2 Policy Update Procedures"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Regular policy review and update schedule"}],["$","li",null,{"children":"Legal counsel review of all modifications"}],["$","li",null,{"children":"Impact assessment for material changes"}],["$","li",null,{"children":"User notification of significant updates"}],["$","li",null,{"children":"Training program updates for staff"}]]}],["$","h3",null,{"children":["$","strong",null,{"children":"9.2 Documentation and Record Keeping"}]}],["$","h4",null,{"children":["$","strong",null,{"children":"9.2.1 Processing Records (Article 30 GDPR)"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Controller and DPO contact information"}],["$","li",null,{"children":"Processing purposes and legal basis"}],["$","li",null,{"children":"Data subject categories and personal data types"}],["$","li",null,{"children":"Recipient categories including third countries"}],["$","li",null,{"children":"International transfer safeguards"}],["$","li",null,{"children":"Retention period information"}],["$","li",null,{"children":"Security measure descriptions"}]]}],["$","h4",null,{"children":["$","strong",null,{"children":"9.2.2 Compliance Documentation"}]}],["$","ul",null,{"children":[["$","li",null,{"children":"Data subject request processing records: 6 years"}],["$","li",null,{"children":"Consent records and withdrawal documentation: Duration of processing + 3 years"}],["$","li",null,{"children":"Data breach incident reports: 5 years"}],["$","li",null,{"children":"DPIA documentation: Duration of processing + 3 years"}],["$","li",null,{"children":"Training records and competency documentation: 7 years"}]]}]]}],["$","article",null,{"children":[["$","h2",null,{"children":["$","strong",null,{"children":"ARTICLE X - CONTACT INFORMATION"}]}],["$","h3",null,{"children":["$","strong",null,{"children":"10.1 GDPR-Specific Contacts"}]}],["$","ul",null,{"children":[["$","li",null,{"children":[["$","strong",null,{"children":"Data Protection Officer:"}]," Email: dpo@chatwet.com",["$","br",null,{}],"Phone: [Direct line to be provided]",["$","br",null,{}],"Address: [Same as company address]"]}],["$","li",null,{"children":[["$","strong",null,{"children":"EU Representative:"}]," Email: eu-representative@chatwet.com",["$","br",null,{}],"Address: [EU address to be provided]",["$","br",null,{}],"Phone: [EU contact number]"]}],["$","li",null,{"children":[["$","strong",null,{"children":"Privacy Rights Requests:"}]," Email: privacy-rights@chatwet.com",["$","br",null,{}],"Secure Portal: [To be implemented]"]}],["$","li",null,{"children":[["$","strong",null,{"children":"Data Breach Notifications:"}]," Email: data-breach@chatwet.com",["$","br",null,{}],"Phone: [24/7 emergency line]"]}]]}],["$","p",null,{"children":[["$","strong",null,{"children":"IMPORTANT:"}]," This policy applies specifically to EU/EEA data subjects and processing activities. For comprehensive privacy information, please refer to our main Privacy Policy. This GDPR policy should be read in conjunction with our Terms and Conditions and other applicable policies."]}],["$","p",null,{"children":["$","strong",null,{"children":"BY USING CHATWET SERVICES, EU/EEA DATA SUBJECTS ACKNOWLEDGE UNDERSTANDING OF THEIR GDPR RIGHTS AND OUR COMPLIANCE OBLIGATIONS."}]}],["$","p",null,{"children":[["$","strong",null,{"children":"OMKAAR GROUP"}],["$","br",null,{}],"Date: [INSERT DATE]",["$","br",null,{}],"Authorized Signatory: [NAME AND TITLE]",["$","br",null,{}],"DPO Approval: [DPO NAME AND DATE]",["$","br",null,{}],"Legal Review Date: [INSERT DATE]",["$","br",null,{}],"Next Review Due: [INSERT DATE + 12 MONTHS]"]}],["$","p",null,{"children":"This GDPR Compliance Policy has been prepared to ensure full compliance with Regulation (EU) 2016/679. It should be reviewed by qualified data protection counsel and updated regularly to maintain compliance with evolving GDPR guidance and enforcement practices."}]]}]]}],[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/0fcd4f902b4eca58.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L8",null,{"children":["$L9","$La",["$","$Lb",null,{"promise":"$@c"}]]}]]}],{},null,false]},null,false]},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","a8x0RJzYA4rKoMikfZ-7iv",{"children":[["$","$Ld",null,{"children":"$Le"}],null]}],["$","$Lf",null,{"children":"$L10"}]]}],false]],"m":"$undefined","G":["$11","$undefined"],"s":false,"S":true} 12:"$Sreact.suspense" 13:I[4911,[],"AsyncMetadata"] 6:{} 10:["$","div",null,{"hidden":true,"children":["$","$12",null,{"fallback":null,"children":["$","$L13",null,{"promise":"$@14"}]}]}] a:null e:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 9:null c:{"metadata":[],"error":null,"digest":"$undefined"} 14:{"metadata":"$c:metadata","error":null,"digest":"$undefined"}