logotype

Introduction

This privacy policy applies to the personal information that RNR Consulting Private Limited (hereafter referred as ‘RNR’ or ‘Company’) collects from you when you visit our website, use our services, or interact with us in other ways.

What personal information do we collect?

We may collect the following personal information from you as a part of our interactions:
  • Contact information, such as your name, email address, and phone number.
  • Demographic information, such as your age, gender, and location.
  • Information about your interests and preferences.
  • Information about your interactions related to our services, domain areas and community.
  • Information about your use (and/or intended use) of our products and services.

How do we collect your personal information?

We collect your personal information in a variety of ways, including:
  • When you provide it to us directly, such as when you contact us, create an account, or submit a form.
  • When you use our website or services, such as when you visit our website, sign up for our newsletter, or download our white paper.
  • When we use cookies and other tracking technologies to collect information about your browsing activity.
  • When we receive your personal information from third parties, such as when you connect your
  • LinkedIn account to our website.
  • When you give us cards?
  • When we have in person and/or virtual interactions

How do we use your personal information?

We use your personal information for the following purposes:
  • To provide you with our services.
  • To communicate with you about our services.
  • To improve our services.
  • To send you marketing and promotional communications.
  • To comply with our legal obligations.
  • To protect our interests.

Who do we share your personal information with?

We may share your personal information with the following third parties:
  • Our service providers, who help us provide our services, such as hosting our website and sending our emails.
  • Our business partners, who help us market our services.
  • Government agencies, if we are required to do so by law.
  • Internal teams like sales and marketing for business connects and development.
  • Internally to our employees and partners for providing services.

How do we protect your personal information?

We take steps to protect your personal information, including:
  • Using security measures to protect your personal information from unauthorized access, use, or disclosure.
  • Requiring our service providers to protect your personal information through NDA.
  • Limiting access to your personal information to those who need it to perform their job duties.

How long do we keep your personal information?

We keep your personal information for as long as it is necessary for the purposes for which we collected it, or as required by law.

Your rights

You have the following rights with respect to your personal information:
  • The right to access your personal information that is stored in our databases.
  • The right to correct your personal information if it is inaccurate or incomplete.
  • The right to delete your personal information.
  • The right to object to the processing of your personal information.
  • The right to restrict the processing of your personal information.
  • The right to port your personal information to another organization.

How to contact us

If you have any questions about this privacy policy, please contact us at info@consultrnr.com or +91 9999767838 with unique Identifier allocated to you by us.

Changes to this privacy policy

We may update this privacy policy from time to time. The most current version will always be posted on our website.

Effective date

This privacy policy is effective from 22nd August 2023

    Service Request Form

    Select Service(s) You Want:

    Information & cyber security program strategy & roadmapEnterprise & cyber security risk assessment & managementThird party risk managementVirtual CISO serviceCyber security awareness programPhishing simulation programThreat modelingUser access governance & certificationIncident management and response planISO 27001/22301/27701/9001RBI master directionNHB cyber security guidelinesIRDAI cyber security guidelinesNIST FrameworkSOC1/SOC2Data localization as per RBI circular of storage of payment system dataCIS frameworkInternal audit managementCloud assessment as per CISDesigning cloud security architectureCSPM security monitoringGap assessment as per applicable guidelinesNetwork architecture reviewFirewall rule reviewFirewall configuration reviewSystem hardening checksVulnerability assessment program managementWeb application penetration testingMobile application penetration testingInfrastructure vulnerability assessmentAPI vulnerability assessmentAPI fuzzingRed teaming ExerciseData protection advisoryData flow diagramDigital personal data protection acData protection controls implementationData discovery and classificationDesigning of data protection policyData governance programDigital personal data protection acGap assessmentArticulation of policy and proceduresISO 27001/22301/27701/9001, PCI-DSS, SOC1/SOC2, COBIT, COSO, HIPPA, RBI, IRDAI, NIST, Data Localization, CISGRC tool implementationArticulation of BCP plan and strategyCrisis management planBCP/DR planning and implementationImplementation of BCMS standard (ISO 22301)Conducting actual and tabletop DR drillsFunctional recovery planGRC resource deployment onsite/offsiteSecurity services resource deployment onsite/offsite

    Contact Details:

    Name (required):

    Organization Name (required):

    Email (required):

    Contact No (required):

    Detail about the requirement (optional):