Privacy Policy

The price for safety is the loss of privacy, hence, it is not negotiable!

We understand the importance of privacy in today’s digital age. There is no general law for a company to have a privacy policy at all times in India. We are aware of the possible liability scenarios to an individual, when there is no policy in place.

As per the Information Technology Act 2000 and the amendment to the Information Technology Act in the year 2009, introduced basic privacy and data protection provisions, governing various issues relating to the internet, maintenance of website and e-commerce.

In compliance to the provisions of the law and as an extension of our organisation’s work environment safety and protection guidelines, here is our privacy policy for usage of this website, which is the virtual face of our organization.

Expand the tab to unfold the respective information on the topic. We urge you to go through them, however, visiting this page means that you are aware of the policy and understand them.

We are a Bangalore, KA, India based software company “Datakue”. ProSight is one of our software product. Our only official website for the product ProSight is “”.

By visiting and using this website, you understand, agree and abide to our terms of privacy policy. This has been last updated on February 1st, 2019.

This policy is applicable for all transactions carried out through this website pertaining to the ProSight. However, when the transactions are carried out in our office directly, our work environment safety and protection guidelines for employees, contractual staff, customers and visitors are applicable.

We collect two kinds of data or information that are of personal and business nature. This is for the purpose for better serving a variety of your needs such as sales enquiry, partnership enquiry, support enquiry, feedback, etc.

When visitors leave comments on our website, which will be operational soon, we intend to collect the data shown in the comments section publicly. We also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: Gravatar Privacy Policy. After approval of your comment, your profile picture is visible to the public in the context of your comment.

You are very important to us. It is our duty to respond back to you with as much relevant and satisfactory information to you as possible. Hence we are dependant on your inputs to serve you in the best possible manner.

We regard your privacy very high and treat it with diligence, in a manner, where the data collected from you will reach only the respective team member. We neither circulate your information freely within our organization nor we sell it.

Every information you provide us is again classified into two forms that are viewable and unviewable. Each form of information is of voluntary nature only such as uploading of media files, accepting cookies, clicking on embedded additional third party tracking, etc. Here are the information on what happens to each one of these.

Media Files

If you upload images to our website, when the provision is open, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.


If you leave a comment on our website, you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have a registered log in to this website, when the provision is open, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, when the provision is open, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, when the provision is open, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, article links, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website. This is out of our purview and you will have to refer to the respective third party websites and apps policies that does not start with or any sub-domain from our website.

We take “abuse” very seriously and we take it both ways that is our website user by our team or vice versa.

Any act of verbal or physical nature being forcibly thrusted upon by one person to another is what we define here as abuse. In this case, our policy governs only our customer and our employees when directly engaged in an act of breaching the personal boundary of one or more party, directly, despite refusal by the other.

In case of any form of abuse, here are the steps to follow,

  1. Write to us from your registered or shared email and contact number with us
  2. Use the subject line “ABUSE”
  3. Be bold to share as much information including the date, time, person, environment, what type of abuse, etc.
  4. Use only this email ID to send your complaint
  5. We will make our first contact to you within a maximum time of 72 hours
  6. Before you hit that send button, kindly verify the list of abuse that we would be able to handle

List of Abuse:

  1. Selling your data to a third party
  2. Visiting you without your consent in your living place
  3. Verbal abuse including being suggestive, or physical abuse while and during officially scheduled appointment
  4. Trying to make personal contact outside the official purpose despite your refusal
  5. Asking for or capturing your photograph in mobile or any electronic devise, without any official requirement intimation or against your refusal
  6. Misuse of your deposited photograph which potentially lead to maligning your identity
  7. Demanding or taking cash in the name of the organization to speed up your transaction process or any business related promises by our employees

Infographic: Types of Data Breach (Source: GDPR Reviews)

Identity Theft
Financial Access
Existential Data
Account Access

We got you covered.

Reach Us …