Last updated: 13th January 2024
Who we are
Shreshta IT Technologies Pvt. Ltd. is a cyber threat intelligence company based out of Belagavi, Karnataka, India.
[Shreshta IT Technologies Pvt. Ltd.] (“us”, “we”, or “our”) operates the website/blog at https://shreshtait.com/blog (the “Service”).
Information Collection and Usage
We do not actively collect personal information from users of our Service. The only information that is logged is the web server access logs. These logs include the IP address, user agent string, and request URI. These logs are used solely for monitoring and maintaining the functionality and security of the Service.
Web Server Access Logs
Access logs are standard in most web hosting environments and are used to record requests made to the server. This information is used for debugging, security, and statistical purposes.
The information logged includes: –
- IP Address: The IP address of the device making the request.
- User Agent String: Information about the browser or client making the request.
- Request URI: The specific resource or URL being requested.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
How long we retain your data
We retain web server access logs for 180 days, in accordance CERT-In mandate for storing logs
Security of Data
We employ appropriate technical and organizational measures to protect the security of the web server access logs. However, no method of electronic storage is 100% secure, and we cannot guarantee absolute security.