UAT AWT Solutions
listShop All
AWT Solutions Logo

Privacy Policy

Thank you for visiting our web site. This privacy policy tells you how we use personal information collected at this site. Please read this privacy policy before using the site or submitting any personal information. By using the site, you are accepting the practices described in this privacy policy. These practices may be changed, but any changes will be posted and changes will only apply to activities and information on a going forward, not retroactive basis. You are encouraged to review the privacy policy whenever you visit the site to make sure that you understand how any personal information you provide will be used.

Note, the privacy practices set forth in this privacy policy are for this web site only. If you link to other web sites, please review the privacy policies posted at those sites.

Collection of Information

We collect personally identifiable information, like names, postal addresses, email addresses, etc., when voluntarily submitted by our visitors. The information you provide is used to fulfill your specific request. This information is only used to fulfill your specific request, unless you give us permission to use it in another manner, for example to add you to one of our mailing lists.

Cookie/Tracking Technology

The Site may use cookie and tracking technology depending on the features offered. Cookie and tracking technology are useful for gathering information such as browser type and operating system, tracking the number of visitors to the Site, and understanding how visitors use the Site. Cookies can also help customize the Site for visitors. Personal information cannot be collected via cookies and other tracking technology, however, if you previously provided personally identifiable information, cookies may be tied to such information. Aggregate cookie and tracking information may be shared with third parties.

Distribution of Information

We may share information with governmental agencies or other companies assisting us in fraud prevention or investigation. We may do so when: (1) permitted or required by law; or, (2) trying to protect against or prevent actual or potential fraud or unauthorized transactions; or, (3) investigating fraud which has already taken place. The information is not provided to these companies for marketing purposes.

Commitment to Data Security

Your personally identifiable information is kept secure. Only authorised employees, agents and contractors (who have agreed to keep information secure and confidential) have access to this information. All emails and newsletters from this site allow you to opt out of further mailings.

POPI Act Policy

  1. Introduction
    1. The provisions of this Addendum are to be read with the Agreement. Where provisions in this Addendum conflict with those in the Agreement, the provisions of this Addendum take precedence, unless agreed otherwise between the Parties.
  2. Data Protection
    1. This addendum will be applicable to all personal information as defined in the Protection of Personal Information Act, 4 of 2013 (“POPI”).
    2. By either Party submitting any personal information to the other, the disclosing Party unconditionally and voluntarily, consents to the processing of the submitted personal information for any and all purposes related to this agreement.
    3. The Parties agrees and consent that its personal information may be processed by, or on behalf of either of the Parties for the purposes set out in the Agreement.
    4. The Parties shall at all times comply with its obligations and procure that each of its Affiliates comply with their obligations under POPI.
    5. The Parties shall ensure that any personal information that is processed by it in the course of performing its obligations under the Agreement is done in accordance with POPI.
    6. Each Party shall not process, disclose or use personal information except:
      1. to the extent necessary for the provision of Services and/or Products under the Agreement; or
      2. to fulfil their own obligations under the Agreement; or
      3. as otherwise expressly authorised by the other Party in writing.
    7. Each Party shall not disclose any personal information to any Third Party without the other Party’s prior written consent in each instance, other than to the extent required by any Regulator or Law.
    8. In the event the other Party providing such consent necessary for the disclosure of personal information to a Third Party, each Party shall:
      1. make such disclosure in compliance with POPI; and
      2. enter into a written agreement with the applicable Third-Party recipient of such personal information that requires such Third Party to safeguard the personal information in a manner no less restrictive than each Party’s obligations under these terms.
    9. The Parties shall implement and maintain an effective security safeguards that includes, but is not limited to administrative, technical, and physical safeguards, and appropriate technical and organisational measures, in each case, adequate to insure the security and confidentiality of personal information, and to protect against any anticipated risks to the security or integrity of personal information, protect against unauthorized access to or use of personal information, protect personal information against unlawful processing or processing otherwise than in accordance with this agreement, and protect against accidental loss, destruction, damage, alteration or disclosure of personal information.
    10. Without limiting the foregoing, such safeguards and measures shall be appropriate to protect against the harm that may result from unauthorised or unlawful processing, use or disclosure, or accidental loss, destruction or damage to or of Personal Information and the nature of the personal information, and shall maintain all safeguard measures as is required by POPI.
    11. Each Party shall not use, process, store, transfer or permit access to any personal information across the borders of South Africa, without the written consent of the other Party.
    12. In the event of any actual, suspected or alleged security breach, including, but not limited to, loss, damage, destruction, theft, unauthorized use, access to or disclosure of any personal information, each Party shall:
      1. notify the other Party as soon as practicable after becoming aware of such event;
      2. provide the other Party will all information regarding the breach in the Party’s knowledge and possession to allow the Party to ascertain what has occurred and which personal information has been affected;
      3. promptly take whatever action is necessary, at each Party’s own expense, to minimise the impact of such event and prevent such event from recurring.
blur_on