top of page

PRIVACY POLICY

Legal disclaimer

Legal Disclaimer (Applicable to All Policies)
Keeyomi Technologies & Solutions


The policies outlined—including the Refund Policy, Company Policy Statement, and Accessibility Statement—are provided for general informational purposes and do not constitute a legally binding commitment unless explicitly stated in a signed contract, Master Service Agreement (MSA), Statement of Work (SOW), or other official documentation issued by Keeyomi Technologies & Solutions (“the Company”).

While the Company strives to maintain accurate and up-to-date information, we make no warranties or representations, express or implied, regarding completeness, reliability, suitability, or legal enforceability of these policy documents. The contents may be updated, modified, or replaced without prior notice.

Nothing contained within these policies shall override, supersede, or amend any terms mutually agreed upon in a signed agreement between the Company and a Client. In the event of any conflict between these policies and a contract, the terms of the signed contract shall prevail.

Keeyomi Technologies & Solutions shall not be liable for any direct, incidental, indirect, or consequential damages arising from the interpretation or use of these policies. Clients and users are encouraged to seek independent legal counsel to understand how these policies may apply to their specific circumstances.

Use of the Company’s services signifies acceptance of these policies and this disclaimer.

Privacy Policy  

Policy Statement
Keeyomi Technologies & Solutions – Company Policy Statement


Keeyomi Technologies & Solutions is committed to delivering innovative, secure, and high-quality software solutions that enable our clients to achieve digital transformation and operational excellence.

Our Commitments
1. Quality & Excellence
We adhere to global industry standards, best practices, and proven methodologies to ensure consistent and reliable outcomes across all projects.

2. Client-Centric Approach
We work collaboratively with our clients, ensuring transparent communication, timely delivery, and solutions tailored to their unique business needs.

3. Ethical Conduct
We operate with integrity, honesty, and professionalism in all interactions. We maintain strict confidentiality and respect intellectual property rights.

4. Innovation & Continuous Improvement
We invest in ongoing research, learning, and adoption of emerging technologies to deliver advanced, future-ready solutions.

5. Data Security & Privacy
We follow robust security practices, compliance frameworks, and international privacy standards to protect client data and systems.

6. Inclusivity & Accessibility
We strive to ensure that our digital solutions are accessible, user-friendly, and inclusive for all users, regardless of ability.

7. Sustainable Growth
We foster a culture of responsibility, collaboration, and long-term partnerships that create shared value for clients, employees, and communities.

Privacy Policy Exclusions Disclaimer (What Is Not Covered)

Privacy Policy Exclusions Disclaimer (What Is Not Covered)
The following exclusions clarify situations where Keeyomi Technologies & Solutions is not responsible for the collection, processing, storage, or security of personal or business data.

1. Third-Party Platforms and Integrations
This Privacy Policy does not apply to:

Third-party tools, APIs, cloud services, or plugins integrated into client systems
External payment gateways
Social media platforms
SaaS products used by the client (e.g., Shopify, Google Cloud, AWS, Azure, HubSpot, Meta Ads, Google Analytics)
Clients are responsible for reviewing and complying with the privacy policies of these third-party providers.


2. Client-Controlled Data or Systems
Keeyomi is not responsible for:

Data stored on client-owned servers, hosting providers, or IT infrastructure
Data collected by the client independently (e.g., from their own customers, employees, or partners)
Security configurations or access permissions managed solely by the client
Any breaches arising from weak passwords, unauthorized access, or misconfigured systems under client control

3. Data Not Provided or Managed by Keeyomi
This policy does not cover:

Data the client chooses NOT to share with Keeyomi
Legacy data or systems the client maintains
Sensitive data shared without prior notice, without authorization, or outside agreed project scope

4. Publicly Available Information
Keeyomi does not apply this policy to data that is already:

Publicly available on the internet
Published by the client through blogs, websites, marketing channels
Uploaded by the client to public forums or social media

5. External Websites and Links
Keeyomi’s website or communication may contain external links.
This policy does not apply to:

Websites linked from our site
Partner or vendor sites
Any external resources the user navigates to
Keeyomi has no control over and assumes no responsibility for their privacy practices.


6. User-Generated Content
This exclusion covers:

Testimonials
Reviews
Uploaded portfolio materials
Data sent voluntarily via chat, email, messaging apps, or public channels
Such content is shared at the user's discretion and may be publicly visible depending on the platform.


7. Data Shared for Support or Troubleshooting
Keeyomi is not liable for:

Temporary data shared for debugging, testing, or support
Screenshots, logs, or credentials voluntarily sent by the client
Any misuse of such data outside the official secure communication channels

8. Unrelated or Misrouted Communications
This Privacy Policy does not apply to:

Emails, messages, or calls sent to incorrect or unofficial Keeyomi addresses
Spam, unsolicited proposals, or unrelated communication

9. Situations Beyond Reasonable Control (Force Majeure)
Keeyomi is not responsible for data issues resulting from:

Natural disasters
Cyberattacks on global internet infrastructure
Power outages
Government restrictions
Any event outside Keeyomi’s reasonable control

10. Client Non-Compliance with Agreed Security Practices
Exclusions include:

Failure to follow recommended cybersecurity guidelines
Unauthorized sharing of credentials
Lack of two-factor authentication (2FA)
Installing unverified apps or scripts on systems

bottom of page