1. Information We Collect
At IMARA TEK, we prioritize the confidentiality of our clients, enterprise partners, and platform visitors. We collect information necessary to deliver custom software engineering, mobile application ecosystems, and secure cloud consulting services.
- Direct Information: Contact credentials, company legal titles, and structural software requirements provided during discovery calls or form completions.
- Technical Device Insights: IP configurations, browser frameworks, diagnostic telemetry data, and site navigation trends gathered via tracking cookies to secure our digital perimeters.
2. How We Utilize Your Data
Data processing is exclusively focused on delivering optimal product results, specifically:
- Provisioning, hosting, maintaining, and testing custom-built customer applications.
- Managing automated CI/CD infrastructure, cloud identity systems, and enterprise APIs.
- Fulfilling compliance requirements with native mobile marketplace guidelines (Apple App Store & Google Play Console).
3. Data Retainment & Enterprise Security Controls
As a software house implementing modern cybersecurity practices, IMARA TEK maintains rigorous security controls. Data blocks, source code repositories, and configuration secrets are managed through isolated environments protected by strict identity governance configurations, encryption protocols, and multi-factor authentication loops.
We do not broker, rent, or distribute client contact records or operational system logs to secondary marketing agencies.
4. Compliance Under Regional Frameworks
Depending on geographical location, users retain strict verification, structural adjustment, or complete database deletion rights (e.g., California Consumer Privacy Act/CCPA or global privacy equivalents). Direct compliance requests can be initiated by contacting our data protection desk at info@imara-tek.com.
1. Terms of Engagement
By interacting with this platform or retaining software consulting services provided by IMARA TEK, you agree to comply with our standardized terms of service and all valid local regulatory frameworks.
2. Engineering Scope & Intellectual Property
All source code, platform designs, architectural maps, and algorithmic workflows developed by IMARA TEK remain the protected intellectual asset of IMARA TEK until all contractual milestone invoices and project delivery clearances are settled in full according to individual Master Services Agreements (MSA).
Unauthorized reproduction, scraping, reverse-engineering, or exploitation of proprietary code libraries hosted or presented within this system is strictly forbidden.
3. Hosting and Platform Deployments
For custom products deployed via cloud accounts managed by IMARA TEK (including AWS, Google Cloud, and Firebase hosting pipelines), clients are bound by the service level commitments and compliance guidelines enforced by those third-party providers. IMARA TEK is not liable for infrastructure downtime or performance regressions caused directly by platform provider outages.
4. Limitation of Liability
In no event shall IMARA TEK, its executive officers, or its engineering team be held accountable for unexpected operational losses, security vulnerabilities introduced via third-party modules, or system down-times resulting from structural client modifications made outside of our official maintenance scopes.