PRIVACY POLICY

This policy aims to inform individuals whose personal data is processed by Rainpark Technologies LLC, Techpro Education in accordance with the Law, Regulation, Decree, and ISO 27701 Personal Data Management System standard on the Privacy of Personal Data. For detailed information, you can review our Personal Data Management System Policy at www.techproeducation.com 

Who are we?

Rainpark Technologies LLC / Techpro Education is an online company based in the USA that provides IT education through bootcamps and various IT course organizations in the field of Information Technology. We were established in 2019 at 9 E Loockerman St Suite 311, Dover, DE 19901, USA.

Our Responsibilities?

While all company employees are responsible for implementing this policy, the company's Senior  Management and Information Technology Team have special roles and responsibilities in protecting Personally Identifiable Information (PII): Senior Management is responsible for overseeing and continuously improving the privacy of PII within the company and leading the design, implementation, operation, and maintenance of the Personal Information Management System (PIMS) based on ISO/IEC 27701. The Information Technology Team is responsible for complying with company policies regarding privacy and confidentiality agreements, monitoring and tracking the overall status of networks and network devices, and performing the application, configuration, and maintenance of computer networks and software, ensuring that access to personal data is limited to authorized personnel and not shared with or provided to unauthorized individuals.

Personal data processing principles?

The Company collects, stores and processes information that reveals the identity of natural persons, including names, addresses, usernames and passwords, and photographs. Such Personally Identifiable Information (PII) is collected only after disclosure to those responsible for the PII and, where necessary, after obtaining consent. Once collected, the following rules apply without exception and in all circumstances.

Personal data is processed and stored in accordance with the following principles;

a) Compliance with the law and good faith.

b) Being accurate and, where necessary, up-to-date.

c) Being processed for specific, explicit and legitimate purposes.

d) Being relevant, limited and proportionate to the purpose for which they are processed.

e) Protection against any unauthorized or illegal access.

Personal Data:

a. It may not be transmitted informally.

b. It may not be retained for longer than the designated retention period.

c. It may not be transferred to organizations, states or countries that do not ensure proper protection of PII.

d. May not be shared with other parties unless authorized by the individual concerned.

  • - All company employees and related parties share responsibility for ensuring that PII is appropriately collected, processed, stored and handled.
  • - The company guarantees that it respects the integrity, confidentiality and availability of information created during the processing of personal data. The firm also ensures that information assets are protected against internal or external and accidental or intentional threats.
  • - Access to personal data should be limited only to those who need it for the purpose of their work.
  • - Personal data should not be shared informally. When access to PII is required, employees must request it formally and in writing.
  • - The firm will provide comprehensive training to all employees to help them understand their responsibilities when handling PII.
  • - PII must not be disclosed internally or externally without prior written request and approval.
  • - Employees should ask their managers, unit coordinators or information security managers when in doubt about the proper handling of PII.
  • - Under certain circumstances and when necessary, the firm may disclose PII to law enforcement authorities without obtaining the consent of the PII custodian. However, the firm will ensure that the request is legitimate, with assistance from legal counsel when necessary.

For what purpose do we process your personal data?

We process your personal data in order to continue our commercial activities and fulfill our legal obligations. You can see the purposes of processing your personal data depending on legal reasons in a table at the end of this policy.

To whom and for what purpose are your personal data transferred?

Your personal data:

In order to carry out our commercial activities:

· To our service providers (instructors, contracted personnel, technology service, etc.),

· To the official institutions of the country you came from, if necessary.

If you have given permission on the Customer Information form:

· To the digital marketing company we work with, in order to send information and notify old customers about special discounts.

In order to fulfill our legal obligations:

· May be transferred to judicial authorities and security units, if necessary.

What are our Personal Data Collection Methods?

Your personal data are processed by requesting from you personally when you apply to our company or our website. In addition, your personal data is also collected and processed in online applications you make through the communication tools and other websites used by our company within the scope of its commercial activities.

What are your legal rights?

You may exercise the following rights at any time by applying to us in person or in writing, provided that your identity is verified. Our company will review your application and respond to you as soon as possible, but not later than 30 days. You have the following rights about yourself:

- to learn whether your personal data has been processed or not, to request information if your personal data has been processed,

- to learn the purpose of processing your personal data and whether they are used in accordance with their purpose,

- to know the third parties to whom your personal data is transferred domestically or abroad,

- to request correction of your personal data in case of incomplete or incorrect processing, to request their deletion or destruction within the framework of the conditions stipulated in the law, and to request notification of these transactions to third parties to whom your personal data has been transferred,

- object to the occurrence of a result to your detriment, in particular by analyzing your processed data through automated systems,

- to demand compensation for damages in case you suffer damage due to unlawful processing of your personal data.

Purposes of Processing Personal Data Based on Legal Grounds

Legal Basis

Purpose

With your express consent

       We send emails, brochures, etc. about our products and services. When you use our website and other applications, we place cookies and similar technologies on your computer or other devices (you can review our cookie policy) to use them for marketing and similar purposes. When we need your personal information for any other purpose besides the ones mentioned above, we explain it and obtain your explicit consent.

Being explicitly stated

in the laws

       The necessity to comply with the articles on the privacy of personal data in the Laws, Regulations, Statutes in the countries where the service is provided, for example; Office of Privacy and Civil Liberties, U.S. Department of Justice, Personal Data Protection Law No. 6698, General Data Protection Regulation (GDPR - General Data Protection Regulation)

       - Requested by security forces or judicial authorities,

     Your information is processed in order to respond to your rights under the Law on the Protection of Personal Data.

In order to fulfill the requirements of a contract 

  • - To be able to make your education or program registrations,
  • - to be able to provide the products and services you requested,
  • - to verify your identity,
  • - to process your payments,
  • - to be able to communicate with you,
  • - to enable customer service to function;
  • - your personal data is processed in order to notify you of mail, phone, or unplanned situations or to inform you.

Protection of the life or physical integrity of oneself or of another person

To be able to share your personal data with emergency services when your life or someone else's life is in danger,

The mandatory processing of data for the legitimate interests of Techpro Education

Your personal data is processed for the following purposes:

  • - Ensuring customer satisfaction,
  • - Maintaining our commercial reputation,
  • - Resolving disputes,
  • - Protecting against fraud,
  • - Monitoring and controlling our systems,
  • - Verifying the validity of your credit card and preventing fraud in credit card payments,
  • - Improving business performance,
  • - Using security cameras and call recording systems,
  • - Preventing and detecting crime,
  • - Marketing our products and services,
  • - Conducting our business in compliance with legal regulations.

The website www.techproeducation.com and communication channels are used for applications.


a. Quality Management System Policy

In order to meet the needs and expectations of our customers in line with our company's objectives and Quality Management System, we commit to:

  • - Complying with the requirements of the Quality Management System,
  • - Continuously improving the Quality Management System,
  • - Never compromising on service quality under any circumstances,
  • - Controlling all risks,
  • - Ensuring the continuous development and satisfaction of our employees,
  • - Prioritizing customer satisfaction by effectively addressing customer complaints.

Our Quality Policy:

  • - Adding new services to our existing product and service range in accordance with customer requests,
  • - Ensuring the continued satisfaction of customers by improving product and service quality,
  • - Complying with laws and regulations that directly affect our services,
  • - Keeping up with industry innovations and technological advancements, making continuous improvement a part of every day and every task,
  • - Ensuring the most efficient use of all resources through the active participation of all employees,
  • - Engaging in activities that will satisfy all stakeholders with our trained, knowledgeable, and expert employees,
  • - Establishing an integrated structure with our internal and external customers and suppliers,
  • - Ensuring safe and productive work environments,
  • - Providing quick solutions to the needs and dynamics of the industry by adhering to ethical values, following developing and up-to-date technologies without compromising on quality,
  • - Ensuring the effective and efficient use of our resources, creating sustainable environments, and continuously improving all kinds of services we provide,
  • - Providing our services quickly and reliably, protecting the environment, utilizing our experienced workforce, technological infrastructure, and resources effectively to continuously improve our system, and becoming one of the leading organizations in the industry.

b. Information Security Management System Policy

In order to ensure the continuous improvement of our Information Security Management System, our company commits to:

  • - Implementing the necessary controls for all assets that exceed the acceptable level,
  • - Measuring the performance of information security processes,
  • - Generating objectives from this data,
  • - Determining and minimizing the risks related to the confidentiality, integrity, and accessibility of information with its infrastructure, work environment, hardware, software, and investments,
  • - Meeting the security of our customers' information in compliance with legal requirements.

Privacy : Preventing unauthorized access to sensitive information.

Integrity : Demonstrating the accuracy and completeness of the information.

Accessibility : Demonstrating the availability of information to authorized individuals when necessary.

Information Security Policy:

  • - Address the security of all data, not just those stored electronically; but also written, printed, verbal, and similar mediums,
  • - Provide Information Security Management System (ISMS) training to all staff to raise awareness,
  • - Report all actual or suspected vulnerabilities in information security to the ISMS Team and ensure they are investigated,
  • - Periodically assess information security to identify current risks, review action plans based on evaluations, and monitor them,
  • - Prevent any disputes or conflicts of interest that may arise from contracts,
  • - Ensure accessibility to information and meet operational requirements for information systems,
  • - Define information security objectives and activities, plan and implement the ISMS, monitor it, and ensure its continuous improvement,
  • - Determine duties, roles, responsibilities, and necessary resources within the scope of ISMS,
  • - Establish an inventory of information assets by defining criteria for confidentiality, integrity, and accessibility,
  • - Identify, evaluate, and implement appropriate risk management options to manage information security,
  • - Prepare, maintain, and test business continuity plans,
  • - Follow current technologies and innovations in information security and develop solutions,
  • - Take necessary measures to ensure all stakeholders comply with the defined aspects of information security,
  • - Announce this policy, ensure its accessibility, raise awareness, and ensure its implementation,
  • - Initiate and monitor the relevant processes in case of a breach of this policy.

c. Privacy Informatin Management System Policy

Our company:

  • - In the context of protecting individuals' fundamental rights and freedoms, especially the privacy of private life, collects and processes personal data in compliance with the laws, primarily in the USA, European Union Member Countries, and Turkey,
  • - All our personal data processing activities are within the scope of our policy. This includes the processing of personal and specially qualified personal data of employees, employee candidates, customers, suppliers, and any data collected and processed from any source,
  • - Takes necessary technical and administrative measures to prevent the unlawful processing of personal data and to ensure the protection of the data, conducting necessary audits in this context,
  • - Processes personal data in accordance with the law and rules of honesty; accurately and when necessary, up-to-date; for specific, clear, and legitimate purposes; and in a connected, limited, and measured manner,
  • - Retains data for the period stipulated in the laws or required by the purpose of personal data processing,
  • Informs personal data owners and provides necessary information when personal data owners request information,
  • - Acts in accordance with the regulations foreseen for the processing of specially qualified personal data and does not engage in actions and activities without explicit consent, except for cases explicitly foreseen in the laws,
  • - Acts in accordance with the regulations foreseen in the law regarding the transfer of personal data,
  • - Raises awareness among internal and external stakeholders about the protection of personal data and communicates related obligations,
  • - Organizes training to increase awareness about the protection of personal data and to develop technical and behavioral competencies,
  • - Manages personal data breaches, evaluates the issue according to the disciplinary procedure, and immediately informs the board authorities about crimes and violations that require punishment,
  • - Continuously monitors the confidentiality, integrity, up-to-dateness of personal data, and the authorities accessing personal data with process-based asset inventory and process-based risk assessment,
  • - Commits to implementing the Personal Data Protection Management System, managing it systematically, ensuring its continuous improvement, and allocating the resources the system needs.