This Agreement has been drawn up with the aim of determining the method of exchange of confidential information that the Parties will open to each other during their work during their negotiations and determining the rights and obligations for the protection of Confidential Information opened by one party to the other.
"Confidential Information", which may be exchanged between the Parties for the purpose specified in this contract, means all of the information of the Party that owns them, in the nature of trade secrets and/or proprietary; These include, without limitation, design information, technical information, trade secrets, ideas and inventions, projects, drawings, models, software programs, algorithms, software modules, program source codes, technical specifications, product plans and technologies, software user manuals, marketing information, customer lists, forecasts and evaluations, financial reports, contract provisions, records and all information and materials related to the business of the Party in question, all kinds of products, goods and materials related to itself, its shareholders, affiliates, other authorized persons, customers and consultants. The service includes the method used to obtain them, trade secrets, all kinds of formulas, know-how, patents, inventions, designs, customer lists, budget, business development, marketing and pricing plans and strategies and all similar information. Confidential information that can be obtained by examining and testing projects, drawings, devices or components that may be given to the other Party by the Party that opened the information and/or information with a degree of confidentiality explained (not in writing) with verbal, visual, examples or models, and confidential information that can be obtained by using similar methods. such "Confidential Information" and will be treated under this Agreement. If the information that has been opened orally, when the Party that opened this information opens the information, it clearly states that this information given orally is Confidential Information and notifies the other Party in writing within 10 (ten) days after opening the information, the information given to the other party orally is Confidential Information. will be treated as Informations; It will be protected and used as Confidential Information.
The party receiving the confidential information accepts, declares and undertakes to comply with the following articles for the protection and use of the Confidential Information indefinitely from the date of termination or expiration, in the event that the contract is terminated or the validity period expires during the term of this Agreement: a) To use Confidential Information only for the purpose for which it was provided by the other Party, b) Providing Confidential Information to its own personnel in accordance with the “need-to-know” principle, provided that they are relevant to the subject, by ensuring that they comply with the terms of this Agreement, c) To show the care taken by the party opening the Confidential Information to protect the Confidential Information that is at least his own and equally important Confidential Information, d) Not to disclose Confidential Information to third parties, including its shareholders, affiliates and subsidiaries, without the written consent of the Party that disclosed the Confidential Information, e) not to copy or reproduce Confidential Information in any form, in whole or in part, except as necessary to fulfill the purposes of this Agreement; If copied or reproduced, in whole or in part, for the purpose of this Agreement, to place on the copied or reproduced copies a restrictive phrase equivalent to that on the original text, f) to ensure that the organization, subcontractor or other third parties to whom Confidential Information is transferred are subject to the same limitations regarding the storage and disclosure of Confidential Information, if required for the purpose of this Agreement.
The Party that receives the Confidential Information shall have no responsibility or liability as set forth under Article 4 regarding any Confidential Information with the following qualifications: a) If the Confidential Information is known to the Party receiving the Confidential Information at the time of receipt and this can be proven by evidence(s), b) If it has been independently developed by the personnel of the Party receiving the Confidential Information who are not aware of this Confidential Information and this can be proven by evidence(s), c) If it is known to the public at that time or disclosed to the public later, through no fault of the Party receiving the Confidential Information, d) Without similar restrictions and without violating this Agreement, if they are legally obtained from a third party, following the fulfillment of all necessary investigations and investigations that the third party is not under the obligation not to disclose the Confidential Information of the third party, and this can be proven by evidence(s), e) If it is necessary to disclose the Confidential Information to the Government of the Party receiving the Confidential Information within the framework of the law, by informing the Party that disclosed the Confidential Information in writing in advance, f) If their publication or use is approved with the written consent of the Party that opened the information.
Apart from the general regulations given above,Our company may collect personal data for various purposes. How and in what way the collected personal data is collected, how and how this data is protected is stated below.
By filling out various forms and questionnaires on our Membership or System, some personal information of the members (such as name-surname, company information, telephone, contract, address or e-mail addresses) is collected by our System due to the nature of the business. Our system, QR code reading system or cover photo etc. for the equipment in the application. Members require camera access to their own mobile devices so that additions can be made. In our system, tracking of the works to be done through the application, communication etc. For situations like this, you need to allow location access. In our system, as stated above, you need to give the media permission to transfer the equipment shots of the members from their mobile devices to their own galleries. When you want to add instant camera shots to the equipment in the application or if you want to add the desired picture from the gallery to that equipment, you must allow the necessary memory permission so that the relevant pictures can be reduced in size and uploaded to the system. It is the responsibility of the person using the application to use these requested access permissions for other than their intended purpose.
Our system may send campaign information, information about new products, promotional offers to its customers and members in certain periods. Our members can make all kinds of choices about whether or not to receive such information while becoming a member, then this selection can be changed in the account information section after logging in as a member, or they can make a notification with the link in the information message they receive.
During the approval process via our system or by e-mail, personal information transmitted to our system electronically by our members will not be disclosed to third parties, except for the purposes and scope determined by the "User Agreement" we have made with our Members.
Our company records and uses the IP address of its members in order to identify system-related problems and to quickly resolve any problems or disputes that may arise regarding the service provided. IP addresses can also be used to identify users in a general way and to gather comprehensive demographic information.
Our company may use the requested information for direct marketing purposes by itself or by the people it cooperates with, even outside the purposes and scope determined by the Membership Agreement. Personal information can also be used to contact the user when necessary. Information requested by our company or information provided by the user or information about transactions made through our System; It can be used in various statistical evaluations, database creation and market research without disclosing the identity of our members, even outside the scope and purposes determined by the "Membership Agreement" by our company and its collaborators.
Our company, to keep confidential information strictly private and confidential, to consider it a confidentiality obligation, to ensure and maintain confidentiality, to take all necessary measures and take all necessary care to prevent all or any part of confidential information from entering the public domain or unauthorized use or disclosure to a third party. commits to show
CREDIT CARD SECURITYOur company prioritizes the security of credit card holders who shop from shopping sites. Your credit card information is not stored in any way our system.
When you enter the transaction process, there are two things you need to pay attention to to understand that you are on a secure site. One of them is a key or lock icon on the bottom line of your browser. This indicates that you are on a secure website and all your information is encrypted and protected. This information is only used depending on the sales process and in the direction of your instructions. The information about the credit card used during shopping is encrypted with 128-bit SSL (Secure Sockets Layer) protocol, independent of our shopping sites, and sent to the relevant bank for questioning. If the card availability is approved can be sustained for shopping. Since no information about the card can be viewed and recorded by us, third parties are prevented from obtaining this information under any circumstances. The reliability of payment/invoice/delivery address information of orders placed online by credit card is audited by our company against Credit Card Fraud. Therefore, the accuracy of financial and address/telephone information must first be confirmed in order for customers who order from our shopping sites for the first time to arrive at the procurement and delivery stage. In order to check this information, if necessary, the customer who has the credit card or the relevant bank is contacted. Only you can access and change all the information you provide while becoming a member. If you protect your member login information securely, it is not possible for others to access and change information about you. For this purpose, it is acted within the 128-bit SSL security area during membership transactions. This system is an international encryption standard that cannot be broken.
Internet shopping sites with an information line or customer service service and where full address and telephone information are specified are more preferred today. In this way, you can get detailed information about all the issues that come to your mind, and you can get healthier information about the reliability of the company that provides online shopping service.
Note: We recommend that you pay attention to the full address and telephone number of the company on internet shopping sites. If you are going to shop, make a note of all the phone / address information of our system where you bought the product before you do your shopping. Confirm by phone before shopping if you do not trust. All information about our company and the location of the company are indicated on all our online shopping sites.
MAIL ORDER CREDIT CARD INFORMATION SECURITY
Your identity and credit card information, which you will send to us by credit card mail-order method, will be kept by our company according to the principle of confidentiality. This information is kept for 60 days against possible credit card withdrawal objections with the bank and then destroyed. If any amount is withdrawn from your card other than the mail-order form approved by you, which you will send to us in return for the price of the products you ordered, you can naturally object to the bank and prevent the payment of this amount, so it does not pose a risk.
THIRD PARTY WEBSITES AND APPSOur system may link to other sites within the website. Our company does not bear any responsibility for the privacy practices and contents of the sites accessed through these links. Advertisements published on the website of our company are distributed to our users through our advertising partners. The Privacy Policy Principles in this agreement are only for the use of our System and do not cover third party websites.
EXCEPTIONAL CIRCUMSTANCESIn the limited cases specified below, our company may disclose the information of users to third parties, except for the provisions of this "Privacy Policy". These cases are limited in number; 1.Law, Decree-Law, Regulation, etc. To comply with the obligations imposed by the legal rules in force issued by the competent legal authority; 2.In order to fulfill the requirements of the "Membership Agreement" and other agreements concluded by our system with the users and to put them into practice; 3.Requesting information about users for the purpose of conducting an investigation or investigation duly carried out by the authorized administrative and judicial authority; 4.These are the cases where it is necessary to provide information to protect the rights or security of users.
EMAIL SECURITYNever write down your credit card number or passwords in the e-mails you send to the Customer Services of our system regarding any of your orders. Information contained in e-mails can be viewed by third parties. Our company cannot guarantee the security of the information transferred from your e-mails under any circumstances.
BROWSER COOKIESOur company can obtain information about the users visiting our system and the use of the website by using a technical communication file (Cookie). The technical communication files mentioned are small text files that a website sends to the user's browser to be stored in the main memory. The technical communication file facilitates the use of the Internet by storing status and preferences about the site.
The technical communication file helps to obtain statistical information about how many people visit the site, for what purpose, how many times a person visits the site and how long they stay on the site, and to dynamically generate advertisements and content from specially designed user pages for users. The technical communication file is not designed to retrieve data or any other personal information from the main memory or your e-mail. Most of the browsers are initially designed to accept the technical communication file, but users can change the settings so that the technical communication file does not arrive or a warning is given when the technical communication file is sent.
Our company can change the provisions of this "Privacy Policy" at any time by posting it on the site or by sending an e-mail to users or publishing it on its site. If the terms of the Privacy Policy are changed, they will take effect on the date of publication.
For any questions or suggestions regarding our privacy policy, you can send an e-mail to mobil@vvino.com.tr. You can reach our company's contact information below.
State of Irresponsibility:
Any direct, indirect, special, incidental or consequential loss of use, loss of profit or any other damage to the device, tools, equipment, personnel and/or third parties of the using Party, due to any error or defect in the Confidential Information opened by one party to the other party under this Agreement. The Party that opened the information will not be held responsible for any loss.
Breach of Contract:
In the event that the Parties violate any of their obligations under this Agreement and in particular regarding the protection of Confidential Information obtained pursuant to this Agreement, the violating Party shall be liable to compensate for the loss or damage awarded by the Court.