T-Mat Global T-Mat Global
Let's Talk
Legal & Compliance Documentation

Policies &
Guidelines

Transparency, security, and responsible practices are fundamental to how T-Mat Global operates. These policies govern how we protect our clients, partners, systems, and data across every engagement.

Jump to a Policy
Security

Responsible Vulnerability Disclosure Policy

T-Mat Global is committed to maintaining the security of our systems, services, and client infrastructure. We actively encourage responsible disclosure of security vulnerabilities by security researchers and the public.

Scope

This policy applies to all T-Mat Global owned and operated digital assets including our primary website (t-matglobal.com), client-facing portals, internal systems, and infrastructure managed on behalf of clients where we have explicit authorization to receive disclosures.

How to Report

Report all suspected vulnerabilities in writing to security@t-matglobal.com. Include a clear description of the vulnerability, steps to reproduce, potential impact assessment, and any supporting evidence such as screenshots or proof-of-concept code. Do not exploit or attempt to access data beyond what is necessary to demonstrate the vulnerability.

Our Commitments

We will acknowledge receipt of your report within 48 hours. We will provide a substantive response including our assessment and planned remediation timeline within 10 business days. We will not pursue legal action against researchers acting in good faith under this policy. We will keep you informed of our progress throughout the remediation process.

Out of Scope

The following activities are explicitly out of scope and prohibited: denial of service attacks, social engineering of T-Mat Global staff or clients, physical security testing, testing of third-party systems without explicit authorization, automated scanning that impacts system availability, and accessing or exfiltrating client data beyond the minimum necessary to demonstrate the vulnerability.

Coordinated Disclosure

T-Mat Global follows a coordinated disclosure model. We ask that researchers allow us a reasonable remediation period — typically 90 days — before publicly disclosing confirmed vulnerabilities. We will work with researchers to agree on appropriate disclosure timelines and coordinate any public announcements.

Recognition

T-Mat Global acknowledges the valuable contribution of security researchers. With the researcher's permission, we will publicly credit individuals who responsibly disclose verified security vulnerabilities that result in a material improvement to our security posture.

Security Disclosures: security@t-matglobal.com  ·  Response within 48 hours
Privacy

Privacy Policy

T-Mat Global respects your privacy and is committed to protecting all personal data collected through our website, services, and client engagements. This policy describes what data we collect, why we collect it, how we use it, and your rights in relation to it.

Data We Collect

We collect personal data in the following categories: Contact information (name, email address, phone number) submitted through our contact forms or email. Business information (company name, role, requirements) provided as part of service inquiries. Technical data (IP address, browser type, pages visited, time on site) collected automatically when you visit our website. Communication records including emails and meeting notes related to client or prospect engagements.

Legal Basis for Processing

We process personal data under the following legal bases: Contractual necessity — processing required to fulfil a service engagement. Legitimate interests — processing necessary for our business operations where not overridden by your rights. Consent — where you have explicitly opted in to a specific use of your data. Legal obligation — processing required to comply with applicable law.

How We Use Your Data

Personal data is used exclusively to respond to your inquiries and communications, deliver contracted services, send service-related updates and notifications, fulfil legal and regulatory obligations, and improve the quality of our services and website. We do not use personal data for automated decision-making or profiling. We do not sell personal data to third parties.

Data Sharing

T-Mat Global does not share personal data with third parties except where necessary to deliver contracted services (for example, cloud infrastructure providers operating under appropriate data processing agreements), where required by applicable law or regulatory authority, or where you have given explicit consent for a specific sharing arrangement. All third-party processors are contractually bound to process data only as instructed.

Your Rights

You have the right to access the personal data we hold about you, request correction of inaccurate data, request deletion of your data where we have no legal obligation to retain it, object to processing based on legitimate interests, request restriction of processing in certain circumstances, and withdraw consent where processing is based on consent. To exercise any of these rights, contact us at hr@t-matglobal.com.

International Transfers

Where personal data originating in the US, UAE, or UK is processed in India, T-Mat Global ensures appropriate contractual safeguards are in place — including standard contractual clauses and data processing agreements — to protect your data in accordance with applicable data protection law.

Privacy Requests: hr@t-matglobal.com  ·  +91 9356307015
Data Protection

Data Protection Policy

T-Mat Global implements comprehensive technical and organizational measures to safeguard all data — client data, employee data, and business data — against unauthorized access, loss, destruction, or misuse.

Technical Controls

All data in transit is encrypted using TLS 1.2 or higher. All data at rest is encrypted using AES-256. Access to all systems containing personal or confidential data is protected by multi-factor authentication. All production systems are hosted on major cloud infrastructure (AWS, Azure, GCP) with enterprise-grade physical and logical security controls.

Access Control

Access to client data and confidential information is governed by role-based access control (RBAC) on a minimum-privilege basis. Access rights are reviewed quarterly and revoked immediately upon employee or contractor offboarding. All access to sensitive systems is logged and monitored. Shared credentials are prohibited.

Organizational Measures

All T-Mat Global employees and contractors complete data protection training at onboarding and annually thereafter. All personnel with access to client data sign formal confidentiality agreements. Data protection obligations are incorporated into all employment and contractor agreements. A designated data protection point of contact is responsible for overseeing compliance.

Vulnerability Management

T-Mat Global conducts regular vulnerability assessments on all systems used in client delivery. Critical vulnerabilities are remediated within 24 hours, high-severity within 7 days, and medium-severity within 30 days. All third-party dependencies are monitored for known CVEs using automated scanning tools integrated into our CI/CD pipelines.

Backup & Recovery

All client project data and critical operational data is backed up daily with geographically redundant storage. Backup integrity is verified through regular restoration testing. Recovery point objectives (RPO) and recovery time objectives (RTO) are defined per engagement and documented in the applicable SLA.

Third-Party Processors

Where T-Mat Global engages third-party services that process personal or client data — including cloud providers, communication tools, and development platforms — we ensure those providers are subject to appropriate data processing agreements and maintain security standards at least equivalent to our own.

Acceptable Use

Acceptable Use Policy

This policy governs the acceptable use of T-Mat Global's systems, services, infrastructure, and platforms — by employees, contractors, clients, and any other authorized users. Compliance with this policy is a condition of all engagements.

Permitted Use

T-Mat Global systems and services may be used for legitimate business purposes within the scope of the applicable engagement agreement. This includes accessing systems necessary to perform contracted work, communicating through approved channels, and using authorized tools and platforms as part of the delivery workflow.

Prohibited Activities

The following activities are strictly prohibited: accessing systems or data beyond the scope of authorized access; introducing malware, viruses, or malicious code into any system; attempting to circumvent security controls, monitoring, or access restrictions; sharing access credentials with unauthorized parties; using T-Mat Global systems for personal commercial activity; transmitting unsolicited communications; and any activity that violates applicable law.

Client System Access

Where T-Mat Global team members are granted access to client systems as part of a delivery engagement, that access is used exclusively for the purposes defined in the engagement agreement. Access credentials are stored securely, never shared, and revoked or returned to the client at engagement completion.

Monitoring

T-Mat Global reserves the right to monitor use of its systems and services to the extent permitted by applicable law. Monitoring is used to ensure compliance with this policy, protect system security, and investigate suspected policy violations. Users should have no expectation of privacy when using T-Mat Global provided systems in the context of a professional engagement.

Enforcement

Violations of this policy by employees may result in disciplinary action up to and including termination of employment. Violations by contractors may result in immediate termination of the engagement. Violations by clients may result in suspension of service access. T-Mat Global reserves the right to involve law enforcement in cases involving illegal activity.

Reporting Violations

Any suspected violation of this policy should be reported immediately to hr@t-matglobal.com. Reports are treated confidentially. Individuals who report in good faith are protected from retaliation under T-Mat Global's whistleblower policy.

Confidentiality

NDA & Confidentiality Policy

T-Mat Global treats all client information as strictly confidential from the first point of contact. Our NDA framework ensures legal protection for both parties across every stage of the engagement lifecycle.

NDA Execution

A formally executed Non-Disclosure Agreement is offered to all prospective and active clients prior to any substantive discussion of business requirements, technical architecture, or commercial terms. NDAs are bilateral — both parties are bound by mutual confidentiality obligations. T-Mat Global maintains signed NDA records for the duration required by applicable law.

What Is Considered Confidential

All information shared by a client in the context of an engagement or potential engagement is treated as confidential unless explicitly designated otherwise in writing. This includes but is not limited to: business strategy and plans, technical architecture and source code, product roadmaps, commercial terms, customer data, and any proprietary processes or methodologies.

Internal Handling of Confidential Information

Confidential client information is shared internally only on a strict need-to-know basis. All team members with access to client information are bound by confidentiality obligations under their employment or contractor agreements. Confidential information is never discussed in public forums, shared on personal devices, or disclosed to third parties without explicit written consent.

Post-Engagement Obligations

Confidentiality obligations survive the termination of any engagement. T-Mat Global team members remain bound by their confidentiality obligations in respect of client information for a minimum of 3 years following the conclusion of the relevant engagement, or indefinitely for trade secrets and genuinely proprietary information.

Incident Response

Incident Response Policy

T-Mat Global maintains a documented incident response procedure to ensure that security incidents, data breaches, and service disruptions are identified, contained, and resolved rapidly — with transparent communication to affected clients throughout.

  • 01

    Detection & Identification

    T-Mat Global operates continuous monitoring across all production systems and client delivery environments. All anomalous activity, suspected breaches, and system failures are logged, reviewed, and escalated immediately to the designated incident response lead.

  • 02

    Containment

    Upon confirmation of a security incident, immediate containment measures are activated — including isolation of affected systems, revocation of compromised credentials, and suspension of impacted services where necessary to prevent further damage.

  • 03

    Client Notification

    Clients affected by a confirmed security incident or data breach are notified within 24 hours of confirmation. Initial notification includes a summary of the incident, known impact, and immediate actions taken. A full root cause analysis and post-incident report is provided within 72 hours.

  • 04

    Eradication & Recovery

    Following containment, T-Mat Global conducts a thorough root cause analysis to identify and eradicate the underlying cause of the incident. Systems are restored from clean backups where applicable. All recovery actions are documented and reviewed.

  • 05

    Post-Incident Review

    Every significant incident triggers a formal post-incident review within 5 business days of resolution. The review identifies root causes, evaluates the effectiveness of the response, and produces a set of documented remediation actions to prevent recurrence.

  • 06

    Regulatory Notification

    Where an incident involves personal data and meets the threshold for mandatory notification under applicable law — including Indian IT Act provisions, UK GDPR, or applicable UAE regulations — T-Mat Global will make the required regulatory notifications within the legally mandated timeframe.

  • Incident Reports: hr@t-matglobal.com  ·  +91 9356307015  ·  24-hour response guaranteed
    Data Retention

    Data Retention Policy

    T-Mat Global retains data only for as long as necessary for the purposes for which it was collected, or as required by applicable law. This policy defines our standard retention periods and secure deletion procedures.

    Data Category Retention Period Basis
    Client project files and delivery documentation3 years post-engagementContractual / Legitimate Interest
    Client communication records (emails, meeting notes)3 years post-engagementLegitimate Interest
    Signed contracts, SOWs, and NDAs7 yearsLegal Obligation
    Financial records and invoices7 yearsLegal Obligation (Tax / GST)
    Employee personnel records5 years post-employmentLegal Obligation
    Contractor engagement records3 years post-engagementLegal Obligation
    Website enquiry form submissions2 yearsLegitimate Interest
    Security incident logs3 yearsLegal Obligation / Security
    Access and activity logs1 yearSecurity / Legitimate Interest
    Marketing communications (with consent)Until consent withdrawnConsent

    Secure Deletion

    Upon expiry of the applicable retention period, data is securely deleted or anonymized using methods appropriate to the sensitivity of the data and the medium on which it is stored. For digital data, this includes cryptographic erasure or overwriting. Physical records containing personal data are shredded. Clients may request confirmation of deletion upon request.

    Policy Queries & Contact

    Questions About Our Policies?

    For any question, concern, or request relating to these policies — including data subject rights requests, security disclosures, or compliance queries — contact us directly.

    General & HR
    Security Disclosures

    These policies were last reviewed and updated: March 2026. T-Mat Global commits to reviewing all policies at least annually or upon any material change to our operations, legal obligations, or service delivery model.