Privacy Policy

Introduction

CommVersion Limited does not tolerate modern slavery or human trafficking in our organisation or in our supply chains.

Commversion will not knowingly support or deal with any business involved in slavery or human trafficking. The company Directors and senior management shall take responsibility for implementing this statement to ensure that slavery and human trafficking is not taking place within the organisation and our supply chains.

This statement sets out the steps taken to identify the areas within the business that may be exposed to these risks and how it ensures they are eliminated, as far as possible. This statement, which is for the financial year ended 31 October 2021, is made pursuant to section 54(1) of the Modern Slavery Act 2015 by Commversion Limited.

Supply chains

Our suppliers include services to assist both our business and our customers. These comprise:
catering and cleaning;
suppliers of professional services (software & IT, legal, accountancy, insurance);
office services (fitters, cleaners, support services);
telecoms providers, board/sign companies.

Policy on slavery and human trafficking

The Board of Directors has examined the risk of modern slavery within Commversion and considers the risk to be low. Commversion’s standard practice is to check that prospective employees have the right to work in the geography in which they are located. Where we work with suppliers, these are generally large organisations.
We are committed to conducting our business with honesty and integrity. We adopt and promote a culture of honesty and transparency. We operate a whistleblowing policy, of which all employees are aware, and which encourages staff to report suspected wrong-doing or malpractice as soon as possible.

Further steps

We continue to build on our policy by reviewing and reinforcing the steps we take to vet both existing and new suppliers, adopting a risk-based approach to reduce as far as possible the risk of slavery and human trafficking anywhere in our supply chains. In addition, we will ensure that all of our staff understand the risks of modern slavery and human trafficking to our business and supply chains and that they are aware that such practices will not be tolerated.

Approval

This statement was approved by the Commversion Board on 31st Oct 2020.

Introduction

CommVersion registered as CommVersion Ltd. (all collectively “CommVersion”, “we”, “us” or “our”), respects your privacy and recognizes the importance of your personally identifiable information. We are committed to protecting your information through our compliance with this Privacy Policy. We recommend that you carefully review this privacy and cookies policy. We may change this policy from time to time, but if we do so we will announce this on our website https://commversion.com/. If any changes in our policy are material and/or retrospective in effect, we may provide additional notice as appropriate under the circumstances. Our use and disclosure of particular information will be governed by the Privacy Policy in effect at the time we gather that information.By accessing and using our Website or any of our services, you represent and warrant that you have read and understood, and that you agree to be bound by, this privacy policy and consent to the storage, processing, and transfer of your personally identifiable information.

Data Collection

What personal data do we collect from you?

1. Personal data you provide to us

When using the Website or any of our services – LiveChat which we perform on behalf of our customers, you may provide us with your personal data, personal data includes all personally identifiable information (PII) and data that directly or indirectly identifies you such as your name, email address, phone number and location data if you provide it to us voluntarily. You can control how much information you should provide to us. To use our Website or any of our services, you may provide us with your email id and username.  We strive to keep your Personal Information up to date and maintain its accuracy from the latest details you have provided us.

2. Personal data we collect through your use of our Website

We collect limited personal data from you through your use of our services or Website. The only personal data we actively collect from you beyond that which you have provided through use of any of our services are your IP address, browser software, operating system and the time and date of your visit.

Our Site uses third party analytics to help us understand about our Site visitors. This third party analytics tool does not reveal your name or other identifying information. We do not combine the information collected through use of these analytics with personally identifiable information. The information received from third party analytics is used only to improve our services and the type of information displayed to visitors.

Our website includes features such as live chat and other social media features, such as the ‘Facebook Like button’ and widgets, such as the ‘Share This button’. These features may collect your IP address, which page you are visiting on our site, and may set a cookie to enable the feature to function properly. You should be aware that any personally identifiable information you choose to submit via those media can be read, collected, and used by other participants and could be used to send you unsolicited messages. We are not responsible for the personally identifiable information you choose to submit when you engage in such activities.

Data Use

1. We process your personal data for the following purposes:

Providing you with information about the services of our customers that you have consented to us to share.
For analytics and market research purposes to improve our services, develop new products and launch services for other purposes;
Processing complaints, handling disputes, performing audits and meeting statutory requirements.

2. With whom do we share your personal data?

Our principle is that we do not share your personal data with third parties, unless you have given your specific consent and we have a good reason to do so.

3. Customers

We share your information with our customers. In accordance with our legal obligations we enter into agreements with our customers to safeguard the protection of your personally identifiable data. Also, we recommend that you read and review the privacy policy of our customers carefully to ensure you are fully aware of all the purposes for which your data is being processed.

4. Security of your personally identifiable information

In accordance with the applicable laws and regulations, we have taken adequate technical and organizational measures to safeguard the security of your personal information. We store the personal information that we process on a secure database that is protected by technical access controls.

We take the security of your personally identifiable data seriously. To protect your personally identifiable data that you have provided us against accidental or unlawful destruction, loss or alteration we have implemented technical and organizational security measures to prevent any such accidental destruction or loss, unauthorized disclosure or access.

5. Data Security Breach

We have appropriate security controls and processes in place to prevent any possible security breach, however in case of any Data Breach we have an established Incident Response Team that will act immediately and execute a Remediation Plan in response to any unauthorized access to our information systems. If any data security breach occurs and it may impact your Personal Information, you will be notified as soon as possible once the breach has been determined.

Your Rights

What are your rights?

Based on local laws that pertain to the countries in which our companies have nexus, you may request to review, change or remove your personal data. You can submit such substantiated request including your full name to our Data Privacy Officer (DPO) by clicking here. Our Data Privacy Team will contact you within fifteen (15) business days after receipt of a request to review, change or remove your personal data.

You have the Right (i) to be informed about the personally identifiable data that we process; (ii) You have Right to access your personally identifiable data and have the right to confirm the accuracy of the data; (iii) You have Right to modification/rectification of Inaccurate or incomplete data (iv) You have Right to data portability on request/consent to transfer the personally identifiable data over to another processor; (v) You have Right to erase (right to be forgotten), You can at any time request us to delete/forget your Personally identifiable data. Please note, however, that we can delete your personally identifiable data only if there is no statutory obligation or prevailing right of us to retain it. If you request us delete your personally identifiable data, you will not be able to continue to use any of our service that requires use of your personally identifiable data; (vii) You have the Right to object the processing of your personally identifiable data outside the ambit of your consent.

Cookies and similar technologies

We may use cookies (session and / or persistent cookies) and other similar technologies in our Website. A cookie is a small text file that is delivered with pages from the Website and which is stored by your browser. Cookies have various functions, for example a cookie can store your language preferences or password. Cookies do not usually contain any information that could personally identify you.

Additional Information and Contacts

Children Under the Age of majority (below 18 years).Our services are directed to the general public. We do not knowingly collect information from children under 18 years of age or have any reasonable grounds for believing that children under the age of 18 are accessing our Website or using our services. If we learn that we have inadvertently collected personal information from a child under age 18, we will delete that information as quickly as possible. If you believe that we might have any information from a child under age 18, or if you are a resident outside India under the age of 18 and you wish to remove publicly available content, please contact our DPO at privacy@commversion.com or the mailing address in this Policy.

Retention Period

We will retain your personal information for the period necessary to fulfil the purposes outlined in this Privacy Policy unless a longer retention period is required or permitted by law. In any case we will not retain your personal information beyond the retention period as outlined in the CommVersion data retention policy unless otherwise specified by our customers.If required by law, as is the case to comply with the Children’s Online Privacy Protection, we will nullify such personal information by erasing it from our database.

Representation

We value your privacy and your rights as a data subject and have therefore appointed Prighter Group with its local partners as our privacy representative and your point of contact for the following regions:

- European Union (EU)

Prighter gives you an easy way to exercise your privacy-related rights (e.g. requests to access or erase personal data). If you want to contact us via our representative, Prighter or make use of your data subject rights, please visit the following
website: https://app.prighter.com/portal/14314691846

Contact Us

If you have questions about the use of your personally identifiable data, please contact us at:
CommVersion, 142, Cromwell Road, London, England, SW7 4EF.
or contact our DPO at privacy@commversion.com

Introduction

This Data Processing Agreement ("DPA") is an integral part of the Terms of Use (or any other similarly titled written or electronic agreement addressing similar matters) (“Agreement”) between the Customer (as defined in the Agreement) and CommVersion ("Processor"). Under this Agreement, the Processor provides the Customer ("Controller") with services and software (the “Services”).The Controller and Processor are individually referred to as a "Party" and collectively as the "Parties."This DPA is implemented to ensure compliance with the EU General Data Protection Regulation ("EU GDPR") regarding the Processor’s handling of Personal Data (as defined under the GDPR) as part of its service obligations.The terms outlined in this DPA shall govern the Processor’s processing of Personal Data shared by the Controller in connection with the Agreement. All other provisions of the Agreement remain in full force and effect unless explicitly modified herein.

1. Definitions

Terms not otherwise defined herein shall have the meaning given to them in the EU GDPR or the Agreement. The following terms shall have the corresponding meanings assigned to them below:

1.1 Data Transfer

Means a transfer of the Personal Data from the Controller to the Processor, or between two establishments of the Processor, or with a Sub-processor by the Processor.

1.2. EU GDPR

Means the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation).

1.3. Standard Contractual Clauses

Means the contractual clauses attached hereto as Schedule 1 pursuant to the European Commission’s Implementing Decision (EU) 2021/914 of 4 June 2021 on Standard Contractual Clauses for the transfer of Personal Data to processors established in third countries which do not ensure an adequate level of data protection.

1.4. Controller

Means the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.

1.5. Processor

Means a natural or legal person, public authority, agency, or other body which processes personal data on behalf of the controller.

1.6. Sub-processor

Means a processor/ sub-contractor appointed by the Processor for the provision of all or parts of the Services and Processes the Personal Data as provided by the Controller.

2. Purpose of this Agreement

This DPA sets out various obligations of the Processor in relation to the Processing of Personal Data and shall be limited to the Processor’s obligations under the Agreement. If there is a conflict between the provisions of the Agreement and this DPA, the provisions of this DPA shall prevail.

3. Categories of Personal Data and Data Subjects

The Controller authorizes permission to the Processor to process the Personal Data to the extent of which is determined and regulated by the Controller. The current nature of the Personal Data is specified in Annex I to Schedule 1 to this DPA.

4. Purpose of Processing

The objective of Processing of Personal Data by the Processor shall be limited to the Processor’s provision of the Services to the Controller and or its Client, pursuant to the Agreement.

5. Duration of Processing

The Processor will Process Personal Data for the duration of the Agreement, unless otherwise agreed upon in writing by the Controller.

6. Data Controller’s Obligations

6.1. The Data Controller shall warrant that it has all necessary rights to provide the Personal Data to the Data Processor for the Processing to be performed in relation to the agreed services. To the extent required by Data Privacy Laws, Data Controller is responsible for ensuring that it provides such Personal Data to Data Processor based on an appropriate legal basis allowing lawful processing activities, including any necessary Data Subject consents to this Processing are obtained, and for ensuring that a record of such consents is maintained. Should such consent be revoked by the Data Subject, the Data Controller is responsible for communicating the fact of such revocation to the Data Processor.

6.2. The Data Controller shall provide all natural persons from whom it collects Personal Data with the relevant privacy notice.

6.3. The Data Controller shall request the Data Processor to purge Personal Data when required by the Data Controller or any Data Subject whom it collects Personal Data unless the Data Processor is otherwise required to retain the Personal Data by applicable law.

6.4. The Data Controller shall immediately advise the Data Processor in writing if it receives or learns of any:
6.4.1. Complaint or allegation indicating a violation of Data Privacy Laws regarding Personal Data;
6.4.2. Request from one or more individuals seeking to access, correct, or delete Personal Data;
6.4.3. Inquiry or complaint from one or more individuals relating to the collection, processing, use, or transfer of Personal Data; and
6.4.4. Any regulatory request, search warrant, or other legal, regulatory, administrative, or governmental process seeking Personal Data.

7. Data Processor’s Obligations

7.1. The Processor will follow written and documented instructions received, including email, from the Controller, its affiliate, agents, or personnel, with respect to the Processing of Personal Data (each, an “Instruction”).

7.2. The Processing described in the Agreement and the relating documentation shall be considered as Instruction from the Controller.

7.3. At the Data Controller’s request, the Data Processor will provide reasonable assistance to the Data Controller in responding to/ complying with requests/ directions by Data Subject in exercising their rights or of the applicable regulatory authorities regarding Data Processor’s Processing of Personal Data.

7.4. In relation to the Personal Data, Data Processor shall obtain consent (where necessary) and/or provide notice to the Data Subject in accordance with Data Protection Laws to enable shared Personal Data to be provided to, and used by, the other Party as contemplated by this Agreement.

7.5. Where shared Personal Data is transferred outside the Data Processor’s territorial boundaries, the transferor shall ensure that the recipient of such data is under contractual obligations to protect such Personal Data to the same or higher standards as those imposed under this Addendum and the Data Protection Laws.

7.6. The processor shall inform the controller if, in its opinion, a processing instruction infringes applicable legislation or regulation.

7.7. As A Data Processor ,taking into account the nature of the processing and the information available to the Data Processor, the Data Processor shall assist the data controller in conducting any necessary Data Protection Impact Assessments (DPIAs), as required under GDPR.

8. Data Secrecy

8.1. To Process the Personal Data, the Processor will use personnel who are
8.1.1. Informed of the confidential nature of the Personal Data, and
8.1.2. Perform the Services in accordance with the Agreement.

8.2. The Processor will regularly train individuals having access to Personal Data in data security and data privacy in accordance with accepted industry practice and shall ensure that all the Personal Data is kept strictly confidential.

8.3. The Processor will maintain appropriate technical and organizational measures for protection of the security, confidentiality, and integrity of the Personal Data as per the specifications as per the standards mutually agreed in writing by the Parties.

9. Audit Rights

9.1. Upon Controller’s reasonable request, the Processor will make available to the Controller, information as is reasonably necessary to demonstrate Processor’s compliance with its obligations under the EU GDPR or other applicable laws in respect of its Processing of the Personal Data.

9.2. When the Controller wishes to conduct the audit (by itself or through a representative) at Processor’s site, it shall provide at least fifteen (15) days’ prior written notice to the Processor; the Processor will provide reasonable cooperation and assistance in relation to audits, including inspections, conducted by the Controller or its representative.

9.3. The Controller shall bear the expense of such an audit.

10. Mechanism of Data Transfers

Any Data Transfer for the purpose of Processing by the Processor in a country outside the European Economic Area (the “EEA”) shall only take place in compliance as detailed in Schedule 1 to the DPA. Where such model clauses have not been executed at the same time as this DPA, the Processor shall not unduly withhold the execution of such template model clauses, where the transfer of Personal Data outside of the EEA is required for the performance of the Agreement.

11. Sub-processors

11.1. The Controller acknowledges and agrees that the Processor, may engage a third-party Sub-processor(s) in connection with the performance of the Services, provided such Sub-processor(s) take technical and organizational measures to ensure confidentiality of Personal Data shared with them; The current Sub-processors engaged by the Processors and approved by the Controller are listed in Annex III of Schedule 1 hereto. The processor shall notify the controller at least thirty (30) calendar days in advance of any intended changes or additions to its Sub-processors listed in Annex III by emailing notice of the intended change to Customer. In accordance with Article 28(4) of the GDPR, the Processor shall remain liable to Controller for any failure on behalf of a Sub-processor to fulfil its data protection obligations under the DPA in connection with the performance of the Services.

11.2. If the Controller has a concern that the Sub-processor(s) Processing of Personal Data is reasonably likely to cause the Controller to breach its data protection obligations under the GDPR, the Controller may object to Processor’s use of such Sub-processor and the Processor and Controller shall confer in good faith to address such concern.

12. Personal Data Breach Notification

12.1. The Processor shall maintain defined procedures in case of a Personal Data Breach (as defined under the GDPR) and shall without undue delay notify Controller if it becomes aware of any Personal Data Breach unless such Data Breach is unlikely to result in a risk to the rights and freedoms of natural persons.

12.2. The Processor shall provide the Controller with all reasonable assistance to comply with the notification of Personal Data Breach to Supervisory Authority and/or the Data Subject, to identify the cause of such Data Breach and take such commercially reasonable steps as reasonably required to mitigate and remedy such Data Breach.

12.3. No Acknowledgement of Fault by Processor. Processor’s notification of or response to a Personal Data Breach under this DPA will not be construed as an acknowledgement by Processor of any fault or liability with respect to the data incident.

13. Return and Deletion of Personal Data

13.1. The Processor shall at least thirty (30) days from the end of the Agreement or cessation of the Processor’s Services under the Agreement, whichever occurs earlier, shall return to the Controller all the Personal Data, or if the Controller so instructs, the Processor shall have the Personal Data deleted. The Processor shall return such Personal Data in a commonly used format or in the current format in which it was stored at discretion of the Controller, soon as reasonably practicable following receipt of Controller’s notification.

13.2. In any case, the Processor shall delete Personal Data including all the copies of it as soon as reasonably practicable following the end of the Agreement.

14. Technical and Organizational Measures

Having regard to the state of technological development and the cost of implementing any measures, the Processor will take appropriate technical and organizational measures against the unauthorized or unlawful processing of Personal Data and against the accidental loss or destruction of, or damage to, Personal Data to ensure a level of security appropriate to: (a) the harm that might result from unauthorized or unlawful processing or accidental loss, destruction or damage; and (b) the nature of the data to be protected [including the measures stated in Annex II of Schedule 1

Dotted lines

SCHEDULE 1

ANNEX I

A. LIST OF PARTIES

Data exporter(s):

Name : Customer (As set forth in the relevant Order Form).
Address: As set forth in the relevant Order Form.
Contact person’s name, position, and contact details: As set forth in the relevant Order Form.
Activities relevant to the data transferred under these Clauses: Recipient of the Services provided by CommVersion in accordance with the Agreement.
Signature and date: Signature and date are set out in the Agreement.
Role Controller/ Processor): Controller

Data importer(s):

Name: CommVersion
Address: 142, Cromwell Road, London, England, SW7 4EF
Contact person’s name, position, and contact details: Rahul Unde, DPO, Email id privacy@commversion.com
Activities relevant to the data transferred under these Clauses: Provision of the Services to the Customer in accordance with the Agreement.
Signature and date: Signature and date are set out in the Agreement.
Role (controller/processor): Processor.

B. DESCRIPTION OF TRANSFER

Categories of data subjects whose personal data is transferred.

Customer’s authorized users of the Services.

Categories of personal data transferred

Name, Address, Date of Birth, Age, Education, Email, Gender, Image, Job, Language, Phone, Related person, Related URL, User ID, Username.

Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialized training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.

No sensitive data collected.

The frequency of the transfer (e.g., whether the data is transferred on a one-off or continuous basis).

Continuous basis

Nature of the processing

<ADD>

Purpose(s) of the data transfer and further processing

The purpose of the transfer is to facilitate the performance of the Services more fully described in the Agreement and accompanying order forms.

The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period

The period for which the Customer Personal Data will be retained is more fully described in the Agreement, Addendum, and accompanying order forms.

For transfers to (sub-) processors, also specify subject matter, nature, and duration of the processing

The subject matter, nature, and duration of the Processing more fully described in the Agreement, Addendum, and accompanying order forms.

C.COMPETENT SUPERVISORY AUTHORITY

Data exporter is established in an EEA country.The competent supervisory authority is as determined by application of Clause 13 of the EU SCCs.

Dotted lines

ANNEX II

TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA

Description of the technical and organisational security measures implemented by CommVersion as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.

  • Security
  • Security Management System

* Organization. CommVersion designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.


* Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data.  These policies are updated at least once annually.


* Assessments. CommVersion engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.


* Risk Treatment. CommVersion maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.


* Vendor Management. CommVersion maintains an effective vendor management program


* Incident Management. CommVersion reviews security incidents regularly, including effective determination of root cause and corrective action.


* Standards. CommVersion operates an information security management system that complies with the requirements of ISO/IEC 27001:2022 standard.


  • Personnel Security

* CommVersion personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. CommVersion conducts reasonably appropriate background checks on any employees who will have access to client data under this Agreement, including in relation to employment history and criminal records, to the extent legally permissible and in accordance with applicable local labor law, customary practice and statutory regulations.
* Personnel are required to execute a confidentiality agreement in writing at the time of hire and to protect Customer Personal Data at all times. Personnel must acknowledge receipt of, and compliance with, CommVersion’s confidentiality, privacy and security policies. Personnel are provided with privacy and security training on how to implement and comply with the Information Security Program. Personnel handling Customer Personal Data are required to complete additional requirements appropriate to their role (e.g., certifications). CommVersion’s personnel will not process Customer Personal Data without authorization.


  • Access Controls

* Access Management. CommVersion maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.  


* InfrastructureSecurity Personnel. CommVersion has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. CommVersion’s infrastructure security personnel are responsible for the ongoing monitoring of CommVersion’s security infrastructure, the review of the Services, and for responding to security incidents.


* Access Control and Privilege Management. CommVersion’s and Customer’s administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign on system in order to use the Services  


* InternalData Access Processes and Policies – Access Policy. CommVersion’s internal data access processes and       policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. CommVersion designs its systems to only allow authorized persons to access data they are authorized to access based on principles of “least privileged” and “need to know”, and to prevent others who should not have access from obtaining access. CommVersion the use of unique user IDs, strong passwords, two factor authentication and carefully monitored       access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel’s job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with CommVersion’s internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for       accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity.


  •  Data Center and Network Security

* Infrastructure. CommVersion hasAWS as its datacenter.


* Resiliency. Multi Availability Zones are enabled on AWS and CommVersion conducts Backup Restoration Testing on regular basis to ensure resiliency.      


* Server Operating Systems. CommVersion’s servers are customized for the application environment and the servers have been hardened for the security of the Services. CommVersion employs a code review process to increase the security of the code used to provide the Services and enhance the security products in production environments.    

 
* Disaster Recovery. CommVersion replicates data over multiple systems to help to protect against accidental destruction or loss. CommVersion has designed and regularly plans and tests its disaster recovery programs.

     
* Security Logs. CommVersion's systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, CommVersion’s systems.


* VulnerabilityManagement. CommVersion performs regular vulnerability scans on all infrastructure components of its production and development environment. Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.      


  •   Networks and Transmission.

* Data Transmission. Transmissions on production environment are transmitted via Internet standard protocols.  


* External Attack Surface. AWS Security Group which is equivalent to virtual firewall is in place for Production environment on AWS.

       
* Incident Response. CommVersion maintains incident management policies and procedures, including detailed security incident escalation procedures. CommVersion monitors a variety of communication channels for security incidents, and CommVersion’s security personnel will react promptly to suspected or known incidents, mitigate harmful effects of such security incidents, and document such security incidents and their outcomes.


* Encryption Technologies. CommVersion makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit.  


  •   DataStorage, Isolation, Authentication, and Destruction.

CommVersion stores data in a multi-tenant environment on AWS servers. Data, the Services database and      file system architecture are replicated between multiple availability zones on AWS. CommVersion logically isolates the data of different customers. A central authentication system is used across all Services to increase uniform security of data. CommVersion ensures secure disposal of Client Data through the use of a series of data destruction processes.


Dotted lines

ANNEX III

LIST OF SUB-PROCESSORS

The controller has authorized the use of the following sub-processors:


Name of Sub-processor Description of Processing Location of Sub-processor
Amazon Web Service Running the Production environment including the Application and Databases USA
Vercel Production Application Hosting -
WebFlow Website Hosting Platform -
Microsoft 365 Email services and Documentation UK
Google Workspace Email services, Documentation and Analytics India
Mailgun Email services USA
Twilio Calling and SMS services USA
ZOHO Invoicing solutions India
Atlassian Work Management USA
Sentry Error Alerting USA
Github Code Version Control USA
Salesforce CRM solution USA
Freshdesk Customer Service USA
SalesLoft Customer Outreach USA
LiveChat Live Chat Solution IND
Giosg Live Chat Solution -
Postman CRM and API Testing IND
MongoDb Atlas Database Solution IND
PowerBi Data Reporting Platform IND
MetaBase Data Reporting Platform IND
WorkOs User Authentication IND
Scribe Documentation Platform IND
Loom Documentation Platform UK
Zoom Meetings with Customers UK
Aircall Call Bridging Software UK
Wise Payment Gateway UK
GoCardLess Payment Gateway UK
Stripe Payment Gateway UK
DocuSign Secure Document Signing IND
HelloSign Secure Document Signing IND
Calendly Scheduling Software UK
Cleartax - -
Call Hippo - -
Asana - -
Apollo.ai Customer Outreach USA
Wingman Meeting transcriber USA
Hotjar Product analytics USA
Razorpay Payment Gateway India
Mixpanel Product analytics USA
Slack Messaging USA
Cognisaas Customer Onboarding and project workflow management India
Chargebee Invoicing and Payment solution USA
Productboard Project Planning USA
Freshteam HR recruitment USA
2 million+ leads generated

94% of our trials turn into long-term customers

Check Trial Eligibility

Every click costs.
Make every one count.

SmartChat turns your existing traffic into conversion uplift you can prove, and we'll prove the uplift before you pay a penny.

Stat 25%

More qualified leads

Stat 5X

Conversion rate vs bots

C
Stat 94%

Trial success rate

Convert more of the traffic you already have

Turn missed visitors into qualified inquiries and real sales conversations with CommVersion’s AI-powered, human-led conversion system.

Check Circle Fill
Recover qualified inquiries from existing website traffic
Check Circle Fill
Engage, qualify and connect prospects 24/7
Check Circle Fill
AI supports scale while humans drive conversion
Discuss Eligibility

Trusted by leading brands

Scott Dunn GreyCrest BlackFischer Homes GreyAudleySelect Car WhiteAntares HomesCalaPanache Cruises White
Scott Dunn GreyCrest BlackFischer Homes GreyAudleySelect Car WhiteAntares HomesCalaPanache Cruises White