Our App Privacy Policy
This Privacy Policy outlines how we collect, use, share, and protect your personal information when you use our services, including our website “www.kazimadhdtrust.org” application, software, and marketing services. By using our services, you consent to the practices outlined in this policy. Protecting your privacy is important to us.
In this privacy policy, references, “Kazim Trust”, “us”, “we” or “our”, are all references to Kazim Trust.
If you have any queries or concerns about any aspect of this policy or how Kazim Trust handles your information, please email us at info@kazimadhdtrust.org
Information We Collect
Kazim Trust collects personal information from you during the signup process and throughout your online or offline sessions. Below is an outline of the specific data collected at each stage:
Information Collected During Signup
When you sign up through the Kazim Trust mobile app, we collect the following information directly from you:
- First Name
- Last Name
- Country (Dropdown selection)
- Therapist (Dropdown selection)
- Email Address
- Phone Number
- Password
- Confirm Password
- Presenting Symptoms (Dropdown selection)
- Preferred Session Date (Calendar selection)
- How Did You Hear About Us? (Dropdown selection)
- Session Mode (Dropdown selection: Online or Offline)
- Consent: Checkbox to agree to the Terms & Conditions and Refund Policy.
This information is necessary to create your account and schedule Kazim Trust sessions.
Information Added by Therapists During Sessions
After completing the signup process, additional personal information may be collected by therapists during your therapy sessions, either online or offline. This information is added through the Kazim Trust admin panel and is reflected in your profile within the app. The details include:
- Personal Information: Additional contact details, medical history, or any other relevant personal data shared during therapy.
- Family Information: Information about your family background, relationships, or other details to assist in your therapy.
- Other Information: Lifestyle habits, behavioral observations, and other data that may help improve the quality of care.
- Session Details: Session dates, statuses, and payment statuses, which are updated by therapists through the admin panel.
How We Use Your Information
We use the information collected from you for the following purposes:
- To manage your account and schedule your sessions.
- To provide the necessary therapeutic services based on the information collected by therapists during your sessions.
- To communicate with you regarding your appointments and sessions.
- To respond to your inquiries and support requests.
- To keep track of payment statuses and session details.
- To improve our services by using anonymized data for research and analysis.
Do we share your information with third parties?
We collect personal information from you in various ways. In this section, we have elaborated on the different ways we collect your personal information and how that information will be used.
Service Providers:
- We may share data with service providers who assist in operating our business and delivering our services. We will ensure that the third parties who receive your personal information are required to keep it confidential.
Legal Compliance:
- We may disclose your information when required by law or to protect our rights and interests or to investigate, prevent, or take action regarding suspected or any prohibited activities, including fraud
How long do we keep your information?
We only keep your personal information as long as we need to, to be able to use it for the reasons given in this Privacy Policy and for as long as it is required by the law.
Children’s Privacy:
- This site is designed for a general audience and is not directed to children under the age of 15. Kazim Trust does not knowingly collect or solicit personal information from children under the age of 15 through this site. If we receive any personal information from a child under the age of 15, we will promptly delete that information from our records.
Your rights:
You have information-related rights, including the right to:
- Access, correct, or delete your data
- Withdraw your consent for marketing communications
- Object to the processing of your data
- Request data portability
To exercise these rights or to inquire about your data, please contact us using the information provided in the Contact Information section below.
Data Security:
We take the security of your personal information seriously and employ appropriate measures to protect it from unauthorized access or disclosure.
Measures we take to ensure Applications Data Security.
We take several important measures to ensure the security of application data. Here’s an overview of the key steps and practices we employ to protect application data;
Code Reviews:
Regular code reviews are conducted to identify and rectify security vulnerabilities, code weaknesses, and potential risks in the applications’ codebase.
Authentication and Authorization:
Strong authentication and authorization mechanisms are implemented to ensure that only authorized users can access the application and its data. This includes using multi-factor authentication (MFA) when necessary.
Access Control:
Role-based access control (RBAC) is used to restrict access to sensitive data and application features. Access permissions are granted based on user roles and responsibilities.
Error Handling:
Error handling is implemented to handle exceptions gracefully, without exposing sensitive information in error messages that could be exploited by attackers
Content Security Policy (CSP):
A Content Security Policy is employed to control the sources of content that can be loaded by the application, mitigating the risks of XSS attacks.
Regular updates:
All application components, including libraries and dependencies, are kept up-to-date with the latest security patches to fix known vulnerabilities.
Data Backup and Recovery:
Data is regularly backed up and the restoration process is tested to ensure data can be recovered in the event of data loss.
Third-Party Libraries and Components:
We at Kazim Trust assess the security of third-party libraries and components used in applications and ensure they are kept up-to-date.
Secure Communication:
Secure communication protocols and encryption are used for data transmission within the application and between the application and clients.
Regular Security Training:
The development team receives regular security training to stay informed about the latest security threats and best practices
Vendor Security Assessment:
The security measures of third-party vendors and services integrated into the applications are assessed.
Documentation and Security Policies:
Security practices and policies are documented and made available to the development team, ensuring that all developers adhere to these policies
- These measures collectively help us to maintain strong data security and protect application data from potential threats and vulnerabilities. Data security is an ongoing effort and we continuously monitor, update, and strengthen its security practices to adapt to evolving threats and challenges.
Cookies:
We use cookies and tracking technologies to enhance your browsing experience. You can manage your cookie preferences through your browser settings.
What are Cookies?
- Cookies are small pieces of data that websites store on your computer when you visit the website. They serve various purposes, such as remembering user preferences, improving user experience and
- Helping websites gather information about their visitors. Cookies are created by a web browser when you visit a website and are stored on your device’s hard drive.
There are various types of cookies:
- Session cookies: These are transient cookies that are erased when you close your browser. They are used to track your browsing actions during a single browsing session and to assist websites in recognizing you when as you navigate across pages.
- Persistent Cookies: Unlike session cookies, persistent cookies remain on your device or computer even after the browser is closed. They keep track of your choices and settings for future visits.
- First-Party Cookies: These are determined by a website that is being visited by the user, often used to remember your login information or preferences. The website displayed in the URL window e.g. https://www.kazimadhdtrust.org/
- Third-Party Cookies: These are set by domains other than then the one being visited by the user. These are often used for tracking and advertising purposes.
Cookies play a crucial role in enhancing user experience on the internet, but concerns about privacy and data security have led to increased scrutiny and regulatory measures in some regions. Users can often manage and control cookie preferences through their browser settings, allowing them to accept, reject, or delete cookies. By deleting our cookies or disabling future cookies you may not be able to access certain areas or features of our website.
Changes to this Privacy Policy.
We reserve the right to revise this privacy policy at any time to ensure that it is up-to-date. Significant changes will be communicated through our website or other channels. You are advised to review this Privacy Policy periodically for any changes.