Our solutions and services are geared around Automation, Cybersecurity, and Enterprise IT/ OT Integration.

Privacy Policy

1. Purpose

The purpose of a privacy policy is to communicate about how ACET Solutions collects, uses, discloses, and protects customers personal information.

2. Scope

This policy of applies to all type of information gathered by both employees and our clients.

3. Policy Statement

ACET SOLUTIONS is committed to protecting the privacy and confidentiality of our respected customer’s personal information. This Policy outlines how we collect, use, disclose, and protect the information customers provide to us when accessing our website and application. By using our website or engaging with our application, customer’s consent to the practices described in this policy.

4. Information We Collect

We may collect personal information directly from Customer or through automated means when they interact with our website or application. The types of information we may collect include:

  • Personal identification information: Customer’s name, email address, phone number, and other contact details, if available.
  • Login and usage information: Customer’s IP address, device information, and website/application usage information.
  • Service-Related Information: Information related to the services we provide to our customers, including project details, communication records and billing information.

We ensure that this information is collected lawfully and only for the purposes specified.

5. Sharing Of Information

  • We will never share/rent/trade any customer information with any third-party services provider.
  • We may disclose customer information when required by law, regulation, legal process, or governmental request.

6. Use Of Information

We use the information we collect for the following purposes:

  • Providing and improving our products and services.
  • Communicating with customers regarding updates, changes, or other relevant information.
  • Personalizing customer’s experience and tailoring our offerings to better meet their needs.
  • Ensuring compliance with legal and regulatory obligations.
  • Protecting against fraudulent or unauthorized activities.

7. Protection of Customer Personal Data

We take appropriate measures to protect the confidentiality, integrity, and security of personal information entrusted to us. We have implemented technical, and administrative controls to prevent unauthorised access, use, disclosure, or alteration of personal information.

8. Data Retention

We retain personal information for as long as necessary to fulfil the purposes outlined in this Privacy Policy, or until we are doing business with our customer, or unless a longer retention period is required or permitted by law. We will securely dispose of personal information when it is no longer needed.

9. User Rights and Choice

Customers have the right to request for access, update, or deletion of his personal information in our possession. To exercise his rights or make any requests regarding his personal information, please contact us using the information provided in the Contact Us clause.

10 . Third Party Links on Website

Our website may contain links to third-party websites or resources. We are not responsible for the privacy practices or content of such third-party sites. We encourage customers to review the privacy policies of those sites before providing any personal information.

11. Policy Update

We may update this Privacy Policy periodically to reflect changes in our practices or applicable laws. The revised policy will be posted on our website with the effective date. We encourage customers to review the policy periodically to stay informed about how we collect, use, and protect his information. Continued use of our services after such modifications constitutes acceptance of the revised Privacy Policy.

12. Contact US

If Customer have any questions, concerns, or requests regarding this Privacy Policy or our privacy practices, please contact us at [email protected].

Effective Date: March 19th, 2025

Legal

ACET was established in response to the escalating necessity for robust Operational Technology (OT) cybersecurity, spurred by the advent of Industry 4.0 and the digital transformation era. As traditional OT networks became progressively exposed to cyber threats due to heightened interconnection with Information Technology (IT) systems and internet connectivity, the founders of ACET recognized the pressing need for advanced security measures and thereby laid the foundation of the company.
The founders understood the innate vulnerability of networks not initially designed with security as a priority, and they sought to tackle this issue head-on. From its inception, ACET has been committed to providing leading-edge OT cybersecurity and IT/OT integration services and solutions. They assembled a team of certified professionals and experts with extensive industry experience, aiming to offer unparalleled capacity and capability in providing OT cybersecurity services.
The company’s ethos is centred around a holistic approach to cybersecurity, targeting not just the technology, but also the people and processes involved. This approach ensures that critical business data is not only safeguarded but also continuously shared between OT and IT departments, fostering improved operational efficiency and interdepartmental cooperation. Furthermore, the company’s unique business model incorporates the implementation of the best design architecture to secure connected OT networks, thereby reinforcing overall system security.
ACET also ventured into the realm of industrial automation solutions, extending its expertise and services to clients across diverse industries. This move further broadened the company’s reach and influence, fortifying its position as a leading provider in the field.

Let’s Connect and Explore Opportunities Together