Smart Identity

Professional ID printing solutions

Privacy Policy

Privacy Policy

Privacy Policy

Last Updated: 11/05/2026 | Version: 4.0

Related Policies: Terms of Use | Return and Cancellation Policy

1. Introduction

This Privacy Policy describes how Aashi Infosystems ("Company", "we", "our") processes information in connection with the Smart Identity Pro software ("Software"), website, licensing systems, and associated services.

This Privacy Policy should be read together with the Terms of Use and Return and Cancellation Policy. In the event of any conflict, the Terms of Use shall prevail to the maximum extent permitted by applicable law.

2. Definitions

For purposes of this Privacy Policy:

3. Nature of the Service

Smart Identity Pro is a software application used for formatting, extracting, arranging, cropping, rendering and printing compatible identity-related document layouts for user-controlled printing workflows.

The Software is provided as a technical processing and formatting tool and does not:

The User remains solely responsible for lawful collection, access, consent, processing, disclosure, and use of all data processed through the Software.

4. Applicability

This Privacy Policy applies to:

This Privacy Policy does not govern how Users independently collect, obtain, manage, disclose, or otherwise process personal data belonging to their own Customers or end-users.

5. Information Processed

5.1 Identity and Document Data

The Software may process Identity-Related Data uploaded, transmitted, imported, or otherwise handled by the User in connection with requested document-formatting or printing functionality.

Such data may include:

Identity-Related Data may undergo limited transient processing, transmission, buffering, caching, or temporary system handling where technically necessary to provide requested functionality.

The Company does not maintain persistent storage or archival retention of Identity-Related Data processed through the Software.

Identity-Related Data is processed transiently and is ordinarily discarded, overwritten, or released from active processing once requested operations complete, except where limited transient technical handling is reasonably necessary for transmission reliability, abuse prevention, troubleshooting, or security operations.

The Company does not use Identity-Related Data processed through the Software for:

5.2 Technical and Usage Data

The Company may collect and process limited technical and usage-related information, including:

This data is used for:

The Company may use automated systems and operational monitoring mechanisms for these purposes.

5.3 Account, Licensing, and Billing Information

The Company may collect and process information relating to Software licensing, account administration, billing, payments, and customer support, including:

Such information is used for purposes including:

Such processing is necessary for licensing, activation, billing, fraud prevention, support, account security, operational communication, renewal management, and compliance with legal or accounting obligations.

6. Purpose of Processing

Information is processed only for specific operational purposes including:

The Company does not use such data for:

The Company may send operational, transactional, licensing, renewal, support, product-update, or service-related communications relating to the Software and associated services.

7. User Responsibility

The User is solely responsible for:

The Company does not independently verify:

8. Security Measures

The Company implements reasonable technical and organizational security measures intended to protect system integrity, secure communications, and reduce risks of unauthorized access, misuse, alteration, or disclosure of information.

Such measures may include implementation of industry-standard security practices and cryptographic protections, including secure communication protocols, software integrity protections, access-control mechanisms, authorization controls, monitoring systems, and abuse-prevention safeguards, as reasonably appropriate for the nature of the Software and associated services.

However:

In the event of a security incident or suspected personal data breach, the Company may take reasonable steps to investigate, mitigate, contain, and comply with applicable legal obligations.

9. Data Retention

Identity-Related Data processed through the Software is not subject to persistent storage or archival retention by the Company.

Such data may undergo limited transient processing, buffering, caching, or temporary technical handling strictly where necessary for requested functionality, transmission reliability, troubleshooting, abuse prevention, or security operations.

Technical logs, licensing data, billing information, account-related information, and security-related metadata may be retained for limited durations necessary for:

Indicative retention periods may vary depending on technical, operational, security, contractual, or legal requirements.

Operational logs are designed not to intentionally store identity-document contents or personally identifiable information extracted from processed identity documents.

10. Monitoring and Enforcement

The Company may monitor Software usage for:

Monitoring may include:

The Company does not monitor or retain document content beyond transient processing.

Use of the Software constitutes acknowledgment of such operational monitoring.

11. Data Rights and Grievances

Users may contact the Company regarding:

The Company may require reasonable verification before responding to requests.

For privacy-related requests, grievances, or data protection concerns, Users may use the contact channels designated for privacy or grievance matters on the Contact Us page available on this website.

12. Sharing of Information and Third-Party Services

The Company does not sell personal data.

The website, Software, licensing systems, and associated services may rely on third-party infrastructure, payment processors, hosting providers, communication services, analytics or monitoring tools where applicable, security providers, or technical integrations necessary for operation and service delivery.

Such providers may process limited technical, billing, transactional, operational, or communication-related information strictly as necessary for their respective services.

Information may also be disclosed:

Any such sharing is limited to what is reasonably necessary for the relevant purpose.

13. Children's Use

The Software is intended for professional and organizational use and is not directed toward minors.

14. Changes to Policy

This Privacy Policy may be updated at any time without prior notice.

Continued use constitutes acceptance of updated versions.

15. Contact Information

For questions, support requests, billing issues, privacy-related concerns, or grievances, Users may contact the Company through the contact details provided on the Contact Us page available on this website.

The Company may update contact details from time to time without requiring modification of these policies or Terms.

16. Relationship with Terms

Nothing in this Privacy Policy expands the Company's liability beyond what is set out in the Terms of Use.

This Policy and the Terms together govern use of the Software.


× Avatar
Forgot password?
Alps
"