Privacy Policy

Introduction and Commitment to Privacy

Devdost is committed to protecting the privacy and security of personal information collected from visitors to our website, prospective clients, current customers, and all individuals who interact with our services. This Privacy Policy outlines our practices regarding the collection, use, storage, and protection of personal information in accordance with applicable privacy laws and regulations, including but not limited to Pakistani data protection legislation and international privacy standards.

We recognize that privacy is a fundamental right and that trust is essential to successful business relationships. This policy demonstrates our commitment to transparency about our data practices and provides individuals with clear information about how their personal information is handled throughout their interaction with Devdost.

By visiting our website (https://devdost.site), submitting inquiries, engaging our services, or otherwise interacting with Devdost, you acknowledge that you have read and understood this Privacy Policy and consent to the collection, use, and disclosure of your personal information as described herein.

Information We Collect

Personal Information Provided Directly: We collect personal information that you voluntarily provide when contacting us, requesting services, or engaging in business communications. This includes but is not limited to full name and professional titles, email addresses for business communication, telephone numbers and preferred contact methods, company or organization names and business addresses, project requirements and technical specifications, business objectives and commercial goals, and any other information you choose to share during consultations or project discussions.

Website Usage Information: When you visit our website, we automatically collect certain technical information through standard web technologies. This includes IP addresses and general geographic location information, browser types and versions, operating system information, pages visited and time spent on our website, referring websites and search terms used to find our site, and device information including screen resolution and mobile device identifiers when applicable.

Communication Records: We maintain records of all business communications to ensure quality service delivery and project continuity. This includes email correspondence and attachment contents, meeting notes and consultation records, project-related documentation and file exchanges, phone call logs and conversation summaries when relevant to project development, and video conference recordings when explicitly consented to by participants.

Project-Related Information: During development projects, we collect and process information necessary for service delivery including game concept descriptions and creative materials, technical requirements and specification documents, target audience and market research data, branding materials and visual assets, business model and monetization strategy information, and feedback and approval records throughout development phases.

Financial and Payment Information: For billing and payment processing, we collect necessary financial information including billing addresses and contact information for accounting purposes, payment method preferences and processing instructions, invoicing details and project cost breakdowns, and transaction records for completed payments. However, we do not store sensitive payment card information on our systems, relying instead on secure third-party payment processors that maintain PCI DSS compliance.

How We Use Your Information

Service Delivery and Project Management: Personal information is primarily used to deliver contracted services effectively and efficiently. This includes communicating with clients about project requirements, timelines, and deliverables, coordinating development activities and milestone reviews, providing technical support and consultation services, managing project documentation and file sharing, and facilitating collaboration between clients and our development team.

Business Communication and Relationship Management: We use contact information to maintain professional relationships and provide ongoing support including responding to inquiries and service requests, providing project updates and progress reports, sending relevant industry information and company updates, scheduling meetings and consultation sessions, and maintaining communication regarding post-launch support and maintenance services.

Service Improvement and Quality Assurance: Collected information helps us improve our services and operational efficiency through analyzing project outcomes and client satisfaction levels, identifying areas for service enhancement and process optimization, developing new service offerings based on client needs and market trends, and maintaining quality standards through feedback analysis and performance monitoring.

Legal and Regulatory Compliance: We use personal information as necessary to comply with applicable laws and regulations including maintaining business records as required by Pakistani commercial law, responding to legitimate legal requests and governmental inquiries, protecting our legal rights and interests in business disputes, and ensuring compliance with international data protection requirements for global clients.

Marketing and Business Development: With appropriate consent, we may use contact information for business development purposes including informing existing clients about new services or capabilities, sharing relevant industry insights and educational content, inviting participation in surveys or feedback collection initiatives, and maintaining professional relationships through appropriate business communications. We do not engage in unsolicited marketing communications and respect all unsubscribe requests immediately.

Information Sharing and Disclosure

Service Delivery Partnerships: We may share limited personal information with trusted third-party service providers who assist in delivering our services. This includes cloud hosting providers for secure data storage and backup services, communication platforms for video conferencing and file sharing, payment processors for secure transaction handling, and specialized contractors or consultants who may contribute to specific project requirements. All such third parties are bound by confidentiality agreements and data protection requirements.

Legal Requirements and Protection of Rights: We may disclose personal information when required by law or when necessary to protect legitimate interests including compliance with court orders, subpoenas, or other legal processes, cooperation with law enforcement investigations when legally mandated, protection of Devdost’s legal rights and property interests, prevention of fraud or other illegal activities, and protection of the safety and security of individuals or the public when circumstances warrant such disclosure.

Business Transitions: In the event of corporate restructuring, merger, acquisition, or sale of business assets, personal information may be transferred as part of business assets, subject to confidentiality protections and notification requirements. Any such transfer would maintain existing privacy protections and would be communicated to affected individuals with appropriate notice periods.

Client Authorization: We may share information when explicitly authorized by clients for specific purposes such as coordinating with client-designated third parties, providing references or testimonials with client consent, participating in client-requested marketing or promotional activities, or facilitating business relationships that clients specifically request or approve.

Data Security and Protection Measures

Technical Safeguards: We implement comprehensive technical measures to protect personal information from unauthorized access, use, or disclosure. These measures include encrypted data transmission using SSL/TLS protocols for all website communications, secure data storage with encryption at rest for sensitive information, regular security updates and patch management for all systems and applications, network security measures including firewalls and intrusion detection systems, and regular security assessments and vulnerability testing conducted by qualified professionals.

Administrative Controls: Our administrative security measures ensure that personal information access is limited and appropriately controlled including access controls limiting information exposure to authorized personnel only, employee training programs covering data protection responsibilities and procedures, regular review and updating of security policies and procedures, incident response procedures for addressing potential security breaches, and vendor management processes ensuring third-party compliance with security requirements.

Physical Security: Our physical facilities incorporate appropriate security measures to protect information and systems including secure office premises with controlled access systems, environmental controls protecting equipment and data storage systems, secure disposal procedures for documents and electronic media containing personal information, and backup and recovery procedures ensuring business continuity while maintaining data protection.

Data Retention and Disposal: We maintain personal information only as long as necessary for legitimate business purposes or as required by applicable laws. Retention periods vary based on information types and legal requirements, but generally include active client information maintained throughout project duration and reasonable follow-up periods, completed project records retained for specified periods to support warranty obligations and potential future services, communication records maintained according to business record retention policies, and financial records retained according to applicable accounting and tax law requirements.

When retention periods expire, personal information is securely disposed of through approved destruction methods that prevent recovery or reconstruction of disposed information.

Your Privacy Rights and Choices

Access and Correction Rights: You have the right to access personal information we maintain about you and request corrections to inaccurate or incomplete information. Access requests will be processed promptly, and we will provide clear information about what personal information we hold, how it is used, and who it has been shared with when applicable.

Data Portability and Transfer: For certain types of information, you may request portable copies of your personal data in commonly used formats. This is particularly relevant for project-related materials, communication records, and other information that you may wish to transfer to other service providers or retain for your own records.

Deletion and Erasure Rights: You may request deletion of personal information under certain circumstances, subject to legitimate business needs and legal retention requirements. Deletion requests will be evaluated based on the necessity of maintaining information for ongoing services, legal obligations, or legitimate business interests. When deletion is appropriate and legally permissible, we will remove personal information from active systems and ensure secure disposal.

Communication Preferences and Opt-Out Rights: You can control how we communicate with you by specifying preferred communication methods and frequencies, opting out of non-essential business communications while maintaining service-related communications, updating contact preferences and information as your circumstances change, and unsubscribing from marketing communications while maintaining essential service communications.

Complaint and Dispute Resolution: If you have concerns about our privacy practices or believe your privacy rights have been violated, you may contact us directly using the contact information provided below. We are committed to addressing privacy concerns promptly and fairly. You also have the right to file complaints with relevant regulatory authorities if you believe our practices violate applicable privacy laws.

International Data Transfers and Cross-Border Processing

Global Service Delivery: Devdost serves clients internationally, which may require transferring personal information across national borders to deliver contracted services effectively. Such transfers are conducted in accordance with applicable international data protection laws and with appropriate safeguards to ensure continued protection of personal information.

Third-Party Service Providers: Some of our technology service providers and business partners may be located outside Pakistan, requiring international data transfers to utilize their services. We ensure that such transfers comply with applicable legal requirements and that receiving parties maintain appropriate data protection standards through contractual obligations and compliance verification procedures.

Client Location Considerations: When serving international clients, we may need to process personal information in multiple jurisdictions to provide effective service delivery and communication. Such processing is conducted in accordance with the data protection laws of relevant jurisdictions and with appropriate protections for individual privacy rights.

Children’s Privacy Protection

Devdost services are designed for business clients and adult individuals. We do not knowingly collect personal information from children under the age of 13 (or the applicable age of digital consent in relevant jurisdictions) through our website or services. If we become aware that we have inadvertently collected personal information from a child, we will take immediate steps to delete such information from our systems.

Parents or guardians who believe their child may have provided personal information to us should contact us immediately using the contact information provided below. We will investigate such reports promptly and take appropriate corrective action as necessary.

Cookies and Tracking Technologies

Website Functionality Cookies: Our website uses essential cookies necessary for basic website functionality including session management for contact forms and inquiry submissions, security features protecting against unauthorized access attempts, and basic website performance optimization. These cookies are necessary for website operation and are not used for tracking or marketing purposes.

Analytics and Performance Monitoring: We may use analytics tools to understand website usage patterns and improve user experience. Such tools collect anonymous usage statistics including page views and navigation patterns, general geographic information about website visitors, and technical performance data. This information is aggregated and does not identify individual users.

Third-Party Services: Some website features may incorporate third-party services such as embedded videos, social media integration, or communication tools that may use their own cookies or tracking technologies. Users should review the privacy policies of such third-party services to understand their data practices.

Cookie Control and Management: Website visitors can control cookie usage through their browser settings, including blocking or deleting cookies, receiving notifications before cookies are set, and managing third-party cookie preferences. However, disabling certain cookies may impact website functionality or user experience.

Updates and Changes to This Privacy Policy

Policy Modification Procedures: This Privacy Policy may be updated periodically to reflect changes in our business practices, legal requirements, or industry standards. Material changes that significantly affect how we collect, use, or protect personal information will be communicated to affected individuals through appropriate notification methods including email notifications to active clients and customers, prominent website notices about policy changes, and direct communication regarding changes that affect ongoing projects or service relationships.

Version Control and Effective Dates: We maintain clear version control for privacy policy updates, including effective dates for policy changes, identification of material modifications from previous versions, and transition procedures for policy changes that affect existing client relationships. This ensures clarity about which policy version applies to specific interactions or service engagements.

Continued Service and Policy Acceptance: Continued use of our services following policy updates constitutes acceptance of modified privacy practices unless individuals provide written objection within specified notice periods. Individuals who object to material policy changes may terminate service relationships according to applicable agreement terms without penalty for privacy-related objections.

Contact Information for Privacy Matters

Privacy Officer and Data Protection Contact: Questions, concerns, requests, or complaints regarding this Privacy Policy or our privacy practices should be directed to our privacy officer through the following contact methods:

Email: contact@devdost.site
Subject Line: Privacy Policy Inquiry
Mailing Address: Privacy Officer, Devdost, C-Block, Johar Town, Lahore, Pakistan

Response Timeframes and Procedures: We strive to respond to privacy-related inquiries within five (5) business days of receipt. Complex requests or those requiring legal consultation may require additional time, and we will communicate expected response timeframes when initial responses cannot provide complete resolution.

Emergency Privacy Concerns: For urgent privacy matters such as suspected data breaches, unauthorized access concerns, or immediate privacy rights violations, individuals should contact us immediately using the above contact information with “URGENT PRIVACY MATTER” in the subject line to ensure priority handling and rapid response.

Regulatory Authority Information: Individuals also have the right to contact relevant privacy regulatory authorities if they believe our practices violate applicable privacy laws or if they are unsatisfied with our response to privacy concerns. We will cooperate fully with legitimate regulatory inquiries and investigations.

Effective Date and Jurisdiction: This Privacy Policy is effective as of January 2025 and applies to all personal information collection and processing activities conducted on or after this date. Previous privacy policy versions may continue to apply to information collected under earlier policy versions as specified in our records and communication with affected individuals.