1:"$Sreact.fragment" 2:I[4970,[],"ClientSegmentRoot"] 3:I[328,["874","static/chunks/874-8179e1aff5ec9a87.js","766","static/chunks/766-88cba2556eb967be.js","946","static/chunks/946-98cf85e8eaddd93f.js","177","static/chunks/app/layout-3d0363b058443a76.js"],"default"] 4:I[7555,[],""] 5:I[1295,[],""] 7:I[9665,[],"OutletBoundary"] a:I[4911,[],"AsyncMetadataOutlet"] c:I[9665,[],"ViewportBoundary"] e:I[9665,[],"MetadataBoundary"] 10:I[6614,[],""] :HL["/_next/static/css/991efdcd1ebedf92.css","style"] :HL["/_next/static/css/ef46db3751d8e999.css","style"] :HL["/_next/static/css/0fcd4f902b4eca58.css","style"] 0:{"P":null,"b":"_D2urxF4OMzoHuc_3Y31M","p":"","c":["","Privacy-Policy"],"i":false,"f":[[["",{"children":["(Components)",{"children":["(main)",{"children":["(Quiklinks)",{"children":["Privacy-Policy",{"children":["__PAGE__",{}]}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/991efdcd1ebedf92.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/ef46db3751d8e999.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L2",null,{"Component":"$3","slots":{"children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]},"params":{},"promise":"$@6"}]]}],{"children":["(Components)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:style","children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:1:props:style","children":404}],["$","div",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:2:props:style","children":["$","h2",null,{"style":"$0:f:0:1:1:props:children:1:props:slots:children:props:notFound:0:1:props:children:props:children:2:props:children:props:style","children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["(main)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["(Quiklinks)",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["Privacy-Policy",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"main_Container p-5","children":["$","div",null,{"className":"","children":["$","div",null,{"className":"","children":[["$","h2",null,{"style":{"fontSize":"2.5rem","marginBottom":"2rem"},"children":"Privacy Policy"}],["$","p",null,{"className":"mb-4","children":[["$","strong",null,{"children":"Effective Date:"}]," June 1, 2025 ",["$","br",null,{}],["$","strong",null,{"children":"Last Updated:"}]," June 1, 2025 ",["$","br",null,{}],["$","strong",null,{"children":"Version:"}]," 1.0"]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"1. INTRODUCTION AND SCOPE"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","li",null,{"className":"mb-2","children":[["$","h4",null,{"children":" Privacy Commitment "}],["$","p",null,{"children":"Omkaar Group (“Company,” “we,” “us,” or “our”) is committed to protecting the privacy and security of personal information collected through the ChatWet application (“Application,” “Service,” or “Platform”). This Privacy Policy explains how we collect, use, process, store, share, and protect your personal information in compliance with applicable privacy laws and regulations. "}]]}],["$","li",null,{"className":"mb-2","children":[["$","h4",null,{"children":" Legal Basis and Jurisdiction "}],["$","p",null,{"children":[["$","strong",null,{"children":"Primary Jurisdiction: "}]," Republic of India",["$","br",null,{}],["$","strong",null,{"children":"Governing Privacy Laws:"}],"- Information Technology Act, 2000 and Rules thereunder - Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 - Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 - Personal Data Protection Bill (when enacted) - General Data Protection Regulation (GDPR) for EU users - California Consumer Privacy Act (CCPA) for California residents - Other applicable international privacy laws "]}]]}],["$","li",null,{"className":"mb-2","children":[["$","h4",null,{"children":" Scope of Application "}],["$","p",null,{"children":"This Privacy Policy applies to: - All users of the ChatWet mobile application and website - All personal information collected through our services - All processing activities conducted by Omkaar Group - Third-party service providers acting on our behalf - International data transfers and cross-border processing "}]]}]," ",["$","li",null,{"className":"mb-2","children":[["$","h4",null,{"children":" Company Information "}],["$","p",null,{"children":[" ",["$","strong",null,{"children":"Data Controller:"}]," Omkaar Group ",["$","br",null,{}],["$","strong",null,{"children":"Registered Office:"}]," Office No. 102, 1st Floor, Rituraj Business Park, Bicholi Mardana Road, near UNO Business Park, Indore, Deoguradia, Madhya Pradesh 452016, India ",["$","br",null,{}],["$","strong",null,{"children":"Data Protection Officer: "}],"[To be designated] ",["$","br",null,{}],["$","strong",null,{"children":"Privacy Contact:"}]," [privacy@chatwet.com]"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"2. DEFINITIONS AND INTERPRETATION"}],["$","p",null,{"className":"mb-1","children":"Key Definitions "}],["$","p",null,{"children":[["$","strong",null,{"children":"“Personal Information”"}]," means any information relating to an identified or identifiable natural person, including but not limited to name, contact details, identification numbers, location data, online identifiers, and factors specific to physical, physiological, genetic, mental, economic, cultural, or social identity."]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Sensitive Personal Information” "}]," includes passwords, financial information, health data, sexual orientation, biometric data, genetic data, and any information deemed sensitive under applicable law."]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Processing” "}],"means any operation performed on personal information, including collection, recording, organization, structuring, storage, adaptation, retrieval, consultation, use, disclosure, dissemination, restriction, erasure, or destruction."]}],["$","p",null,{"children":[["$","strong",null,{"children":"“User” "}]," means any individual who accesses, uses, or interacts with ChatWet services."]}],["$","p",null,{"children":[["$","strong",null,{"children":"“Third Party”"}]," means any individual, company, or entity other than the User and Omkaar Group."]}]," ",["$","p",null,{"children":[["$","strong",null,{"children":"“Biometric Data” "}]," includes facial geometry measurements, voice patterns, and other biological or behavioral characteristics used for identification purposes."]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"3. INFORMATION COLLECTION "}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 3.1 Information You Provide Directly "}],["$","li",null,{"children":[["$","h4",null,{"children":" Account Registration Information"}],["$","p",null,{"children":[["$","strong",null,{"children":"Mandatory Information: "}]," - Legal name (as per government documentation) - Date of birth and age verification - Gender identity and sexual orientation preferences - Valid email address - Mobile phone number with country code - Geographic location (city, state, country) - Profile password and security questions"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Optional Information: "}]," - Profile biography and personal description - Interests, hobbies, and lifestyle preferences - Educational and professional background - Height, body type, and physical characteristics - Relationship goals and preferences - Social media profile links"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Profile Content"}],["$","p",null,{"children":[["$","strong",null,{"children":"Visual Content:"}]," - Profile photographs (up to 9 images) - Profile videos and visual content - Live streaming content and recordings - User-generated visual media shared in chats"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Audio Content: "}]," - 30-second voice introduction recordings - Voice messages sent in conversations - Audio content shared during calls - Voice patterns for verification purposes"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Text Content: "}]," - Profile descriptions and biographical information - Chat messages and conversation content - Comments and reactions on content - User-generated text content and posts"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Verification Information"}],["$","p",null,{"children":[["$","strong",null,{"children":"Identity Verification:"}]," - Government-issued identification documents (Aadhaar, PAN, Passport, etc.) - Selfie photographs for identity confirmation - Live video verification recordings - Social media account verification links"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Financial Verification:"}]," - Credit card information for international users - Bank account details for withdrawals - Payment method information - Transaction history and billing details"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Know Your Customer (KYC) Data: "}]," - Full legal name as per official documents - Complete residential address - Government identification numbers - Nationality and citizenship information - Employment and income information (if provided)"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","marginBottom":"1rem"},"children":"3.2 Information Collected Automatically"}],["$","li",null,{"children":[["$","h4",null,{"children":"Device and Technical Information "}],["$","p",null,{"children":[["$","strong",null,{"children":"Device Identifiers:"}]," - Unique device identifiers (UDID, Android ID, IMEI) - Device manufacturer, model, and operating system - Mobile network information and carrier details - Device settings and configuration data - Hardware specifications and capabilities"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Application Usage Data: "}]," - App version and installation date - Feature usage patterns and frequency - Session duration and activity logs - In-app purchase history and preferences - Error logs and crash reports"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Network and Connection Information "}],["$","p",null,{"children":[["$","strong",null,{"children":"Internet Protocol Data:"}]," - IP address and geolocation approximation - Internet service provider information - Connection type and network quality metrics - Bandwidth usage and connection stability - VPN or proxy usage detection"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Communication Metadata:"}]," - Call and message timestamps - Communication duration and frequency - Participant information for group interactions - Quality metrics for audio/video calls - Delivery and read receipt information"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","marginBottom":"1rem"},"children":"3.3 Location Information"}],["$","li",null,{"children":[["$","h4",null,{"children":"Precise Location Data "}],["$","p",null,{"children":[["$","strong",null,{"children":"GPS Coordinates: "}]," -Real-time location for nearby user discovery - Location history for travel and movement patterns - Check-in locations and venue information - Location-based matching and recommendations"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Collection Methods: "}]," - GPS satellite positioning - Wi-Fi network triangulation - Cellular tower triangulation - Bluetooth beacon detection - User-manually entered location information"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Location Processing and Storage"}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Retention:"}]," - Current location stored for active matching - Historical location data retained for 90 days - Aggregated location analytics retained for 2 years - User can delete location history at any time"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","marginBottom":"1rem"},"children":"3.4 Biometric Information"}],["$","li",null,{"children":[["$","h4",null,{"children":"Facial Recognition Data "}],["$","p",null,{"children":[["$","strong",null,{"children":"Facial Biometrics: "}]," - Facial geometry measurements for verification - Facial feature mapping for identity confirmation - Age estimation algorithms and results - Gender recognition processing results - Emotion and expression analysis data"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Processing Purposes:"}]," - Identity verification and fraud prevention - Profile photo authenticity confirmation - Age verification compliance - Safety and security enhancement - User experience personalization"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Voice Biometrics "}],["$","p",null,{"children":[["$","strong",null,{"children":"Voice Pattern Analysis:"}]," - Voice print generation for identity verification - Speech pattern recognition and analysis - Language and accent identification - Voice quality assessment for calls - Audio fingerprinting for content protection"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","marginBottom":"1rem"},"children":"3.5 Social Media Integration Data"}],["$","li",null,{"children":[["$","h4",null,{"children":"Connected Account Information "}],["$","p",null,{"children":[["$","strong",null,{"children":"Platform Connections:"}]," - Facebook, Instagram, LinkedIn, Google account links - Social media profile verification data - Friend lists and social connection information - Public posts and social media activity (limited) - Social media profile authenticity verification"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Contact Information"}],["$","p",null,{"children":[["$","strong",null,{"children":"Contact Synchronization:"}]," - Phone contacts with names and numbers - Email contacts and communication history - Social media connections and mutual friends - Contact interaction frequency and patterns - Permission-based contact matching"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"4. INFORMATION USE AND PROCESSING"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"4.1 Primary Processing Purposes "}],["$","li",null,{"children":[["$","h4",null,{"children":" Service Provision and Account Management "}],["$","p",null,{"children":[["$","strong",null,{"children":"Core Platform Functions:"}]," - User account creation, maintenance, and authentication - Profile display and matching algorithm processing - Communication facilitation (chat, voice, video) - Payment processing and subscription management - Customer support and technical assistance"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Personalization and Recommendations:"}]," - Matching algorithm optimization and improvement - Content and user recommendation generation - Personalized advertising and promotional content - Feature customization based on user preferences - User experience enhancement and optimization"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Safety, Security, and Trust "}],["$","p",null,{"children":[["$","strong",null,{"children":"Identity Verification: "}]," - User identity confirmation through multiple methods - Fraud prevention and detection algorithms - Fake profile identification and prevention - Age verification for legal compliance - Account security monitoring and protection"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Content Moderation: "}]," - Automated content screening and filtering - Manual content review and moderation - Inappropriate content detection and removal - Community guideline enforcement - Harassment and abuse prevention"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 4.2 Advanced Processing Applications "}],["$","li",null,{"children":[["$","h4",null,{"children":" Artificial Intelligence and Machine Learning "}],["$","p",null,{"children":[["$","strong",null,{"children":"Algorithm Development: "}]," - Matching algorithm training and improvement - Predictive modeling for user behavior - Natural language processing for content analysis - Computer vision for image and video processing - Machine learning model optimization"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Automated Decision-Making: "}]," - Automated matching and recommendation systems - Content moderation and filtering decisions - Fraud detection and prevention systems - Quality scoring and ranking algorithms - Personalization and targeting algorithms"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Analytics and Business Intelligence "}],["$","p",null,{"children":[["$","strong",null,{"children":"Platform Analytics: "}]," - User engagement and behavior analysis - Feature usage statistics and optimization - Performance monitoring and improvement - Market research and trend analysis - Business strategy development and planning"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Revenue Optimization:"}]," - Subscription and payment pattern analysis - Virtual gift economy optimization - Advertising effectiveness measurement - Pricing strategy development and testing - Customer lifetime value calculation"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"4.3 Communication and Marketing "}],["$","li",null,{"children":[["$","h4",null,{"children":"Direct Communication "}],["$","p",null,{"children":[["$","strong",null,{"children":"Service Communications: "}]," - Account notifications and status updates - Security alerts and verification messages - Payment confirmations and billing notifications - Feature announcements and updates - Customer support communications"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Marketing Communications: "}]," - Promotional offers and subscription upgrades - New feature announcements and tutorials - Personalized content recommendations - Newsletter and blog content distribution - Survey and feedback requests"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Notification Systems "}],["$","p",null,{"children":[["$","strong",null,{"children":"Push Notifications:"}]," - Real-time message and match notifications - Live streaming and event announcements - Safety alerts and security notifications - Payment and transaction confirmations - System maintenance and update notifications"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"4.4 Legal and Compliance Processing "}],["$","li",null,{"children":[["$","h4",null,{"children":"Legal Obligations "}],["$","p",null,{"children":[["$","strong",null,{"children":"Regulatory Compliance:"}]," - Age verification for legal compliance - Anti-money laundering (AML) checks - Know Your Customer (KYC) procedures - Tax reporting and documentation - Data localization requirements"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Law Enforcement Cooperation: "}]," - Legal request response and compliance - Criminal investigation assistance - Court order and subpoena compliance - Emergency disclosure for safety concerns - Regulatory audit and examination support"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"5. INFORMATION SHARING AND DISCLOSURE"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 5.1 Information Sharing Principles"}],["$","li",null,{"children":["$","p",null,{"children":"We do not sell, rent, or lease personal information to third parties for their commercial purposes. Information sharing is limited to specific circumstances outlined in this policy and always conducted with appropriate safeguards and legal basis. "}]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 5.2 Authorized Sharing Categories "}],["$","li",null,{"children":[["$","h4",null,{"children":"Service Providers and Business Partners "}],["$","p",null,{"children":[["$","strong",null,{"children":"Technology Service Providers:"}]," - Cloud storage and infrastructure providers (AWS, Google Cloud) - Content delivery networks (CDN) for media distribution - Payment processors (Stripe, PayPal, Razorpay) - Communication service providers for notifications - Analytics and performance monitoring services"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Business Function Providers: "}]," - Customer support and helpdesk services - Marketing and advertising platform providers - Legal and compliance consulting services - Accounting and financial management services - Background check and verification services"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Processing Agreements:"}]," - All service providers are bound by comprehensive data processing agreements requiring: - Strict confidentiality and security measures - Limited data use only for specified purposes - Compliance with applicable privacy laws - Regular security audits and assessments - Prompt notification of any security incidents"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Legal and Safety Disclosures "}],["$","p",null,{"children":[["$","strong",null,{"children":"Law Enforcement and Legal Authorities: "}]," - Valid legal process (subpoenas, court orders, search warrants) - Emergency disclosures to prevent imminent harm - Regulatory investigations and compliance requests - Anti-terrorism and national security investigations - Criminal investigation assistance and cooperation"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Safety and Protection: "}]," -Child safety and protection agencies - Suicide prevention and mental health crisis intervention - Domestic violence and abuse prevention organizations - Medical emergency response coordination - Threat assessment and violence prevention"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"5.3 Business Transaction Disclosures "}],["$","li",null,{"children":[["$","h4",null,{"children":"Corporate Transactions "}],["$","p",null,{"children":[["$","strong",null,{"children":"Merger, Acquisition, or Sale: "}]," - Due diligence processes for potential transactions - Asset transfer in business sales or mergers - Bankruptcy or insolvency proceedings - Corporate restructuring and reorganization - Investment and funding transactions"]}],["$","p",null,{"children":[["$","strong",null,{"children":"User Protection Measures:"}]," - Advance notification of material business changes - Continued privacy protection under new ownership - Option to delete account before transaction completion - Grandfathered privacy terms where legally possible - Transparent communication about ownership changes"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"5.4 Aggregated and Anonymized Information "}],["$","li",null,{"children":[["$","h4",null,{"children":" Statistical and Research Sharing"}],["$","p",null,{"children":[["$","strong",null,{"children":"Anonymized Data Uses: "}]," - Academic research and scholarly publication - Industry trend analysis and market research - Product development and feature planning - Public health and safety research - Demographic and social behavior studies"]}],["$","p",null,{"children":[["$","strong",null,{"children":"De-identification Standards:"}]," - Removal of direct personal identifiers - Statistical disclosure control techniques - K-anonymity and differential privacy methods - Regular re-identification risk assessments - Compliance with applicable anonymization standards"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"6. DATA STORAGE AND SECURITY"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"6.1 Data Storage Infrastructure "}],["$","li",null,{"children":[["$","h4",null,{"children":"Storage Locations and Architecture "}],["$","p",null,{"children":[["$","strong",null,{"children":"Primary Data Centers: "}]," - Primary servers located in India for Indian user data - Secondary servers in Singapore for regional backup - European data centers for EU user data (GDPR compliance) - United States servers for North American users - Disaster recovery sites in multiple geographic locations"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Localization Compliance: "}]," - Indian user personal data stored within India borders - EU user data processed within European Economic Area - Cross-border transfers only with adequate safeguards - Regular audits of data location and processing - Compliance with applicable data residency laws"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Storage Security Measures "}],["$","p",null,{"children":[["$","strong",null,{"children":"Encryption Standards: "}]," - AES-256 encryption for data at rest - TLS 1.3 encryption for data in transit - End-to-end encryption for private communications - Database-level encryption with separate key management - Regular encryption key rotation and management"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Access Controls: "}]," - Role-based access control (RBAC) systems - Multi-factor authentication for system access - Privileged access management (PAM) systems - Regular access reviews and deprovisioning - Segregation of duties for sensitive operations"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 6.2 Security Measures and Protocols "}],["$","li",null,{"children":[["$","h4",null,{"children":"Technical Safeguards "}],["$","p",null,{"children":[["$","strong",null,{"children":"Network Security:"}]," - Firewall protection and intrusion detection systems - DDoS protection and traffic filtering - VPN requirements for remote system access - Network segmentation and micro-segmentation - Regular penetration testing and vulnerability assessments"]}],["$","p",null,{"children":"Secure software development lifecycle (SDLC) - Regular security code reviews and testing - Web application firewalls (WAF) deployment - API security monitoring and rate limiting - Runtime application self-protection (RASP)"}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Organizational Safeguards "}],["$","p",null,{"children":[["$","strong",null,{"children":"Personnel Security: "}]," - Background checks for employees with data access - Security awareness training and regular updates - Confidentiality agreements and privacy training - Regular security policy reviews and updates - Incident response training and drills"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Vendor Management: "}]," - Security assessments for all third-party providers - Contractual security requirements and SLAs - Regular vendor security audits and reviews - Supply chain risk management - Incident notification and response coordination"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"6.3 Data Retention and Deletion "}],["$","li",null,{"children":[["$","h4",null,{"children":"Retention Periods by Data Type "}],["$","p",null,{"children":[["$","strong",null,{"children":"Account and Profile Data:"}]," -Active account data: Retained during account lifecycle - Inactive accounts: 2 years after last login - Deleted accounts: 30-day recovery period, then permanent deletion - Profile photos and media: Same as account retention - Voice introductions: Same as account retention"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Communication Data: "}]," - Chat messages: 3 years from last message - Voice call metadata: 1 year from call date - Video call recordings: 6 months (with user consent) - Live stream content: 90 days after broadcast - System logs: 2 years for security and audit purposes"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Verification and Security Data:"}]," - KYC documents: 7 years for regulatory compliance - Biometric data: 3 years or until account deletion - Financial transaction records: 7 years for tax compliance - Security incident logs: 7 years for investigation purposes - Fraud prevention data: 5 years for pattern analysis"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Deletion Procedures and Rights "}],["$","p",null,{"children":[["$","strong",null,{"children":"User-Initiated Deletion: "}]," - Account deletion through app settings - Individual content deletion (messages, photos, etc.) - Data download before deletion (data portability) - Confirmation process for irreversible deletions - Status notifications throughout deletion process"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Automatic Deletion:"}]," - Scheduled deletion based on retention policies - Secure deletion using certified methods - Verification of deletion completion - Certificate of destruction for sensitive data - Compliance with legal hold requirements"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"7. USER RIGHTS AND CONTROLS"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"7.1 Fundamental Privacy Rights "}],["$","li",null,{"children":[["$","h4",null,{"children":"Access and Transparency Rights "}],["$","p",null,{"children":[["$","strong",null,{"children":"Right to Access: "}]," - Complete copy of personal information held - Information about processing purposes and legal basis - Details of third parties who have received data - Retention periods for different data categories - Source of information if not collected directly"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Access Request Process: "}]," - Submit request through privacy settings or customer support - Identity verification required for security - Response within 30 days (extendable to 90 days if complex) - Free of charge for reasonable requests - Machine-readable format provided when technically feasible"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Correction and Update Rights "}],["$","p",null,{"children":[["$","strong",null,{"children":"Right to Rectification: "}]," - Correction of inaccurate personal information - Completion of incomplete data - Update of outdated information - Verification of corrected information - Notification to third parties of corrections where required"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Limitations on Corrections: "}]," - KYC-verified data requires additional documentation - Legal restrictions on certain data modifications - Technical limitations for historical data - Third-party verification requirements - Audit trail maintenance for corrections"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 7.2 Control and Choice Rights "}],["$","li",null,{"children":[["$","h4",null,{"children":"Consent Management "}],["$","p",null,{"children":[["$","strong",null,{"children":"Granular Consent Controls: "}]," - Separate consent for each processing purpose - Easy withdrawal of consent through app settings - Clear indication of consent status - Consent renewal for continued processing - Impact explanation for consent withdrawal"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Marketing and Communication Preferences:"}]," - Opt-out from promotional communications - Frequency control for notifications - Channel preferences (email, SMS, push notifications) - Interest-based advertising controls - Third-party marketing opt-out options"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Data Portability and Export "}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Export Services: "}]," - Comprehensive data download in machine-readable format - Selective data export by category or date range - Secure download links with expiration dates - Multiple format options (JSON, CSV, PDF) - Technical assistance for data interpretation"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Portability Scope: "}]," - Profile information and preferences - Chat and communication history - Photo and media content - Transaction and payment history - Account activity and usage data"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"7.3 Deletion and Restriction Rights "}],["$","li",null,{"children":[["$","h4",null,{"children":"Right to Erasure (“Right to be Forgotten”) "}],["$","p",null,{"children":[["$","strong",null,{"children":"Deletion Grounds:"}]," - Personal information no longer necessary for original purpose - Withdrawal of consent where consent was the legal basis - Objection to processing without overriding legitimate interests - Unlawful processing of personal information - Compliance with legal obligation requiring deletion"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Deletion Process: "}]," - Secure deletion from live systems within 30 days - Backup system deletion within 90 days - Third-party notification for shared data - Verification of deletion completion - Certificate of destruction for sensitive data"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Right to Restriction "}],["$","p",null,{"children":[["$","strong",null,{"children":"Restriction Circumstances:"}]," - Disputed accuracy pending verification - Unlawful processing where user opposes deletion - No longer needed but required for legal claims - Pending verification of legitimate grounds for processing - Technical issues preventing deletion"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"7.4 Special Rights for EU Users (GDPR) "}],["$","li",null,{"children":[["$","h4",null,{"children":"Enhanced Protection Rights "}],["$","p",null,{"children":[["$","strong",null,{"children":"Automated Decision-Making: "}]," - Right not to be subject to solely automated decision-making - Human review of automated decisions affecting legal rights - Explanation of algorithmic decision-making process - Ability to contest automated decisions - Alternative decision-making process where available"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Data Protection Officer Contact: "}]," - Direct communication channel with DPO - Independent investigation of privacy concerns - Escalation to supervisory authorities - Specialized GDPR compliance assistance - Regular privacy impact assessments"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Supervisory Authority Rights "}],["$","p",null,{"children":[["$","strong",null,{"children":"Complaint Rights:"}]," - Right to lodge complaint with supervisory authority - Assistance with complaint filing process - Cooperation with supervisory authority investigations - Response to supervisory authority decisions - Appeal process for adverse decisions"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"8. INTERNATIONAL DATA TRANSFERS"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"8.1 Cross-Border Processing Framework "}],["$","li",null,{"children":[["$","h4",null,{"children":"Transfer Mechanisms and Safeguards "}],["$","p",null,{"children":[["$","strong",null,{"children":"Adequacy Decisions: "}]," - Transfers to countries with adequate protection levels - Regular monitoring of adequacy decision status - Alternative safeguards if adequacy status changes - Documentation of transfer basis and safeguards - Impact assessments for high-risk transfers"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Standard Contractual Clauses (SCCs): "}]," - EU Commission-approved SCC implementation - Supplementary measures for additional protection - Regular review of SCC effectiveness - Documentation of transfer impact assessments - Suspension procedures if safeguards inadequate"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Transfer Impact Assessments "}],["$","p",null,{"children":[["$","strong",null,{"children":"Risk Evaluation Factors:"}]," - Destination country privacy laws and practices - Government surveillance and access powers - Legal remedies available to data subjects - Technical and organizational safeguards in place - Additional protection measures required"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Ongoing Monitoring:"}]," - Regular assessment of transfer arrangements - Legal and practical changes in destination countries - Effectiveness of implemented safeguards - Data subject complaint and inquiry tracking - Supervisory authority guidance compliance"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 8.2 Regional Processing Requirements"}],["$","li",null,{"children":[["$","h4",null,{"children":"Indian Data Localization "}],["$","p",null,{"children":[["$","strong",null,{"children":"Sensitive Personal Data: "}]," - Processing within India for Indian residents - Limited transfer exceptions for business necessity - Government approval for certain transfers - Local storage requirements compliance - Regular compliance audits and reporting"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" EU Data Processing "}],["$","p",null,{"children":[["$","strong",null,{"children":"GDPR Compliance Measures:"}]," - EU representative appointment - Data processing within EEA where possible - Binding corporate rules for group transfers - Privacy impact assessments for high-risk processing - Data protection authority coordination"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"9. COOKIES AND TRACKING TECHNOLOGIES"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"9.1 Cookie Usage and Types "}],["$","li",null,{"children":[["$","h4",null,{"children":"Essential Cookies "}],["$","p",null,{"children":[["$","strong",null,{"children":"Strictly Necessary Cookies: "}]," - Authentication and session management - Security and fraud prevention - User preference storage - Load balancing and performance optimization - Error tracking and system stability"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Functional and Analytics Cookies "}],["$","p",null,{"children":[["$","strong",null,{"children":"Performance and Analytics"}]," - Website and app usage analytics - Feature performance measurement - User behavior analysis - A/B testing and optimization - Error tracking and debugging"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Personalization Cookies:"}]," - User preference storage - Language and region settings - Customized content delivery - Recommendation algorithm improvement - User experience optimization"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 9.2 Third-Party Tracking "}],["$","li",null,{"children":[["$","h4",null,{"children":"Advertising and Marketing Technologies "}],["$","p",null,{"children":[["$","strong",null,{"children":"Third-Party Analytics "}]," - Google Analytics for website traffic analysis - Facebook Pixel for advertising effectiveness - Marketing automation platform tracking - Customer journey analysis tools - Conversion tracking and attribution"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Consent Management:"}]," - Cookie consent banners and controls - Granular consent for different cookie types - Easy opt-out mechanisms - Consent renewal and management - Cross-device consent synchronization"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"10. CHILDREN’S PRIVACY PROTECTION"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"10.1 Age Verification and Protection "}],["$","li",null,{"children":[["$","h4",null,{"children":"Minimum Age Requirements "}],["$","p",null,{"children":[["$","strong",null,{"children":"Strict Age Enforcement: "}]," - Minimum age of 18 years for all users - Multiple age verification methods - Parental notification for suspected underage accounts - Immediate termination of underage accounts - Cooperation with parents for age verification"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Enhanced Protection Measures "}],["$","p",null,{"children":[["$","strong",null,{"children":"Proactive Detection: "}]," - AI-powered age estimation from photos - Behavioral analysis for age inconsistencies - Cross-reference with government databases where legal - Community reporting of suspected underage users - Regular audit of age verification effectiveness"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 10.2 Special Protection for Minors"}],["$","li",null,{"children":[["$","h4",null,{"children":"Accidental Minor Data Collection "}],["$","p",null,{"children":[["$","strong",null,{"children":"Immediate Response Protocol: "}]," - Immediate account suspension upon discovery - Secure deletion of all collected information - Parental notification and involvement - Law enforcement reporting where required - Enhanced verification for account restoration"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"11. CALIFORNIA PRIVACY RIGHTS (CCPA)"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"11.1 California Consumer Rights "}],["$","li",null,{"children":[["$","h4",null,{"children":"Disclosure and Access Rights"}],["$","p",null,{"children":[["$","strong",null,{"children":"Information Disclosure: "}]," - Categories of personal information collected - Business and commercial purposes for collection - Categories of third parties receiving information - Specific pieces of personal information held - Sources of personal information collection"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":"Deletion and Opt-Out Rights"}],["$","p",null,{"children":[["$","strong",null,{"children":"Right to Delete: "}]," - Deletion of personal information subject to exceptions - Verification process for deletion requests - Business necessity exceptions - Service provider notification requirements - Completion confirmation and verification"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Right to Opt-Out: "}]," - Opt-out of personal information sales (not applicable) - Third-party sharing limitations - Advertising and marketing opt-out options - Cross-device tracking limitations - Regular consent renewal requirements"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 11.2 CCPA Compliance Procedures "}],["$","li",null,{"children":[["$","h4",null,{"children":"Request Processing "}],["$","p",null,{"children":[["$","strong",null,{"children":"Verification Requirements: "}]," - Identity verification for access requests - Two-step verification for deletion requests - Authorized agent verification procedures - Response timing requirements (45 days) - Extension procedures for complex requests"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"12. DATA BREACH NOTIFICATION"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"12.1 Breach Detection and Response "}],["$","li",null,{"children":[["$","h4",null,{"children":" Detection Systems and Procedures "}],["$","p",null,{"children":[["$","strong",null,{"children":"Monitoring Infrastructure:"}]," - 24/7 security operations center (SOC) - Automated intrusion detection systems - Behavioral analytics for anomaly detection - Regular vulnerability scanning and assessment - Employee training for breach recognition"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Response Procedures "}],["$","p",null,{"children":[["$","strong",null,{"children":"Immediate Response (0-24 hours): "}]," - Incident containment and mitigation - Forensic evidence preservation - Preliminary impact assessment - Internal team notification and mobilization - Legal and regulatory consultation"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Investigation Phase (24-72 hours): "}]," - Detailed forensic analysis - Scope and impact determination - Root cause analysis - Affected user identification - Regulatory authority consultation"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 12.2 Notification Requirements "}],["$","li",null,{"children":[["$","h4",null,{"children":"User Notification "}],["$","p",null,{"children":[["$","strong",null,{"children":"Notification Timeline:"}]," - Affected users notified within 72 hours of discovery - Method: Email, in-app notification, and SMS - Content: Breach nature, affected data, protective actions - Assistance: Dedicated support line and resources - Updates: Regular status updates during investigation"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Authority Reporting: "}]," - Supervisory authority notification within 72 hours (GDPR) - Indian CERT-In notification as required - US state attorney general notification (where applicable) - Law enforcement notification for criminal activity - Industry notification for coordinated threats"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"13. PRIVACY POLICY UPDATES"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"13.1 Amendment Procedures "}],["$","li",null,{"children":[["$","h4",null,{"children":" Material Changes "}],["$","p",null,{"children":[["$","strong",null,{"children":"Significant Modifications:"}]," - 30-day advance notice for material changes - Email notification to all registered users - In-app notifications with change highlights - Opt-out options for objectionable changes - Grandfather provisions where legally required"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" Minor Updates "}],["$","p",null,{"children":[["$","strong",null,{"children":"Administrative Changes: "}]," - Contact information updates - Legal reference corrections - Clarification additions - Process improvements - Technical corrections"]}]]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 13.2 Version Control and Documentation"}],["$","li",null,{"children":[["$","h4",null,{"children":"Change Management "}],["$","p",null,{"children":[["$","strong",null,{"children":"Documentation Requirements:"}]," - Detailed change logs with rationale - Legal review and approval process - User communication planning - Implementation timeline coordination - Compliance verification procedures"]}]]}]]}]]}],["$","div",null,{"className":"mb-2","children":[["$","h2",null,{"style":{"fontSize":"1.5rem","marginBottom":"1rem"},"children":"14. CONTACT INFORMATION AND COMPLAINTS"}],["$","ul",null,{"style":{"paddingLeft":"1.2rem"},"children":[["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":"14.1 Privacy Contact Information "}],["$","li",null,{"children":["$","p",null,{"children":[["$","strong",null,{"children":"Primary Privacy Contact:"}],"Email: privacy@chatwet.com ",["$","br",null,{}],"Phone: [To be provided] ",["$","br",null,{}],"Address: Omkaar Group, Office No. 102, 1st Floor, Rituraj Business Park, Bicholi Mardana Road, near UNO Business Park, Indore, Deoguradia, Madhya Pradesh 452016, India ",["$","br",null,{}],["$","strong",null,{"children":"Data Protection Officer: "}],"[To be designated]",["$","br",null,{}],["$","strong",null,{"children":"EU Representative:"}],"[To be appointed for GDPR compliance] ",["$","br",null,{}],["$","strong",null,{"children":"California Privacy Rights:"}],"privacy-ca@chatwet.com ",["$","br",null,{}]]}]}],["$","h2",null,{"style":{"fontSize":"1.2rem","fontWeight":"bold","marginBottom":"1rem"},"children":" 14.2 Complaint Resolution Process "}],["$","li",null,{"children":[["$","h4",null,{"children":"Internal Complaint Procedures "}],["$","p",null,{"children":[["$","strong",null,{"children":"Complaint Submission: "}]," - Online privacy complaint form - Email submission with detailed description - In-app privacy reporting mechanism - Phone support for urgent privacy concerns - Written complaint submission by mail"]}],["$","p",null,{"children":[["$","strong",null,{"children":"Resolution Process: "}]," - Acknowledgment within 48 hours - Investigation and response within 30 days - Escalation procedures for complex issues - Follow-up communication and verification - Continuous improvement based on feedback"]}]]}],["$","li",null,{"children":[["$","h4",null,{"children":" External Complaint Options "}],["$","p",null,{"children":[["$","strong",null,{"children":"Supervisory Authorities:"}]," - EU Data Protection Authorities for GDPR complaints - State Information Commissions in India - US State Attorneys General for US residents - Industry ombudsman programs - Consumer protection agencies"]}]]}]]}]]}],["$","div",null,{"className":"my-5","children":["$","strong",null,{"children":"BY USING CHATWET, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO THE COLLECTION, USE, AND DISCLOSURE OF YOUR PERSONAL INFORMATION AS DESCRIBED IN THIS PRIVACY POLICY. "}]}],["$","div",null,{"className":"mb-2","children":[["$","strong",null,{"children":["OMKAAR GROUP ",["$","br",null,{}],"Date: [INSERT DATE] ",["$","br",null,{}],"Authorized Signatory: [NAME AND TITLE] ",["$","br",null,{}],"Legal Review Date: [INSERT DATE] ",["$","br",null,{}],"Next Review Due: [INSERT DATE + 6 MONTHS] ",["$","br",null,{}]]}],["$","p",null,{"className":"mt-4","children":"This Privacy Policy has been prepared to comply with applicable privacy laws and regulations across multiple jurisdictions. It should be reviewed by qualified legal counsel specializing in privacy law before implementation. Regular updates are recommended to maintain compliance with evolving privacy regulations and business practices."}]]}]]}]}]}],[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/0fcd4f902b4eca58.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L7",null,{"children":["$L8","$L9",["$","$La",null,{"promise":"$@b"}]]}]]}],{},null,false]},null,false]},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","ns2dLraDrK8gezx29LbN3v",{"children":[["$","$Lc",null,{"children":"$Ld"}],null]}],["$","$Le",null,{"children":"$Lf"}]]}],false]],"m":"$undefined","G":["$10","$undefined"],"s":false,"S":true} 11:"$Sreact.suspense" 12:I[4911,[],"AsyncMetadata"] 6:{} f:["$","div",null,{"hidden":true,"children":["$","$11",null,{"fallback":null,"children":["$","$L12",null,{"promise":"$@13"}]}]}] 9:null d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 8:null b:{"metadata":[],"error":null,"digest":"$undefined"} 13:{"metadata":"$b:metadata","error":null,"digest":"$undefined"}