Your privacy is important to us. This policy explains how we collect, use, and protect your personal information when you use Xtreme Region's platform.
Personal account.
Educational Data: Academic records, grades, attendance, and learning progress when using our school management features.
Communication Data: Messages, video call recordings (when permitted), and chat logs from our conferencing platform.
Usage Data: Information about how you interact with our platform, including pages visited, features used, and time spent.These can only be accessed by the system infrastructure and not by any individual.
Device Information: Technical details about the devices you use to access our platform, such as IP address, browser type, and operating system.
Cookies and Tracking Technologies: We use cookies and similar technologies to enhance your experience and analyze usage patterns.
Consent-Based Data: Any additional information you provide with your explicit consent, such as feedback, surveys, or participation in optional features.
Provide and improve our services and platform functionality.
Personalize your learning experience through recommendations and insights.
Facilitate communication.
Generate analytics and reports for institutions and research purposes.
Ensure platform security, prevent fraud, and comply with legal obligations.
Send important updates, notifications, and content.
Educational Institutions: We share relevant data with your school or institution as part of our services.
Service Providers: Trusted third-party vendors who help us operate our platform under strict confidentiality agreements.
Legal Requirements: When required by law, court order, or to protect our rights and safety.
Business Transfers: In case of merger, acquisition, or sale of assets, with appropriate data protection measures.
Consent-Based Sharing: Any other sharing only occurs with your explicit consent.
End-to-end encryption for sensitive communications and data transmission.
Regular security audits and penetration testing to identify and address vulnerabilities.
Access controls and authentication measures to prevent unauthorized access.
Data backup and recovery systems to ensure continuity and prevent data loss.
Employee training on data protection and privacy best practices.
Compliance with international security standards and data protection regulations.
Access: Request a copy of the personal data we hold about you.
Correction: Update or correct inaccurate personal information.
Deletion: Request deletion of your personal data (subject to legal and contractual obligations).
Portability: Receive your data in a structured, machine-readable format.
Objection: Object to certain types of data processing.