"Empowering your organization with AI, automation, and smart digital solutions"

CALL US
Request Your Free Consultation

Privacy Policy - DGTek Intelligence

At DGTek Intelligence, we are committed to safeguarding your privacy. This privacy policy explains how we collect, use, and protect your personal information when you visit our website and submit your details through our lead generation forms.

Information We Collect

We collect personal information such as:

  • Name
  • Email address
  • Company name
  • Phone number (optional)

How We Use Your Information

We use the personal information you provide to:

  • Contact you regarding our services
  • Provide you with resources, consultations, or updates
  • Improve our offerings and customer experience

We will not share, sell, or rent your personal information to third parties without your explicit consent.

How We Protect Your Information

Your privacy is important to us. We take appropriate measures to safeguard your personal information against unauthorized access, alteration, disclosure, or destruction.

Consent

By submitting your personal information through our lead forms or other contact methods, you consent to the collection and use of your information as outlined in this privacy policy.

Your Rights with DGTek Intelligence

We're committed to transparency and ensuring you understand your rights when working with us.

Can I request access to my data?

Absolutely! You have the right to access any data we've collected or analytics we've built on your behalf. Just reach out and we'll provide it promptly.

Your Rights Checklist

  • Access your data at any time upon request.
  • Request corrections for inaccuracies or incomplete data.
  • Opt-out of automations tied to your personal information.
  • Right to data portability should you switch services.
  • Request deletion of data not needed for business operations.

How do you ensure data security?

Our cybersecurity solutions use AI-driven measures and real-time threat detection to ensure your data is secure, compliant, and protected from unauthorized access.