Privacy Policy for LiveGig

Effective Date: 23rd December 2024

Fursat Farms Private Limited, having its registered office at Dwarika Heights, Darjeeling, India - 734005 including its affiliates and subsidiaries ("we," "us," or "our"), respects your privacy and is committed to protecting it in accordance with the terms of this Privacy Policy ("Policy"). This Policy applies when a natural person accesses, downloads, browses, or uses our platform ("Platform") and/or any legal entity avails, accesses, or uses our cloud-hosted services that make scheduling easy ("Services") through its employees, representatives, or agents ("Personnel"). Collectively, natural persons and legal entities are referred to as "user," "you," or "your."

This Policy describes the types of information we may collect from you or that you may provide when you visit our website ("Website") or use the Platform and Services. It further explains our practices for collecting, using, maintaining, protecting, and disclosing that information.

1. Business Overview

Live Gig, a product of Fursat Farms Private Limited, provides AI-powered solutions for the live music industry, offering tools that streamline documentation and improve performance delivery. Our Services, currently accessible through our Website, include:

  • Easy Scheduling: Artists calendars with integrated payments for venues to find a suitable date & book them accordingly.
  • Calendar Integration: Enabling seamless integration with existing calendar systems to streamline workflows and improve data accessibility. This includes the ability to automatically populate calendar events with all necessary data.
  • Appointment Booking: Offering appointment to enhance convenience and accessibility. This includes features such as online booking, automated reminders, and artist-venue matching for open dates.

3. Data Collection and Usage

3.1 Types of Data Collected

We collect the following types of data to provide and improve our Services:

  • Personal Information: Name, contact details, date of birth, government-issued identifiers, and other information provided during registration or service usage.
  • Music Data: Spotify music data of artists-venues-fans for matching.
  • Metadata: Device information, IP addresses, access times, location data, browser type, operating system, referring URLs, and usage patterns for analytics, service optimization, and security purposes.

3.2 How We Use Your Data

We utilize the data we collect for a variety of purposes aimed at providing, enhancing, and securing our Services, while remaining committed to protecting user privacy. These purposes include:

  • Service Provisioning and Optimization
  • Personalized User Experience
  • Communication and User Engagement
  • Legal and Regulatory Adherence
  • Data Analysis and Reporting

3.3 Data Anonymization

We apply robust anonymization techniques to de-identify data for model training and research, ensuring personal information is removed or masked. This includes methods such as pseudonymization, data aggregation, and differential privacy to protect your identity while utilizing data for research and development.

3.4 Children's Data

We recognize the importance of protecting children's privacy. We do not knowingly collect or process personal data of individuals under the age of 18 without verifiable parental or guardian consent. Practitioners using our Services are responsible for ensuring compliance with all applicable laws and regulations regarding the collection and processing of children's data, including obtaining the necessary consents.

5. Security Measures

We implement comprehensive security practices to protect your data from unauthorized access, use, disclosure, alteration, or destruction:

  • Encryption: Data is encrypted during transmission and storage using industry-standard protocols, such as TLS/SSL and AES-256, to safeguard your information from unauthorized interception.
  • Access Control: Access is limited to authorized personnel based on the principle of least privilege, ensuring that only those who need access to your data for legitimate business purposes can access it. We use role-based access control, multi-factor authentication, and other security measures to enforce access restrictions.
  • Secure Storage: Data is stored on secure servers with advanced physical and technical safeguards, including firewalls, intrusion detection systems, and regular security assessments. We partner with reputable data center providers that comply with industry security standards.
  • Regular Audits: Periodic security audits and vulnerability assessments are conducted by independent third-party security experts to identify and address potential weaknesses in our systems and processes.
  • Pseudonymization: Where feasible, data is pseudonymized to limit direct identification. This involves replacing identifying information with pseudonyms or artificial identifiers, making it more difficult to link the data back to you. Pseudonymization techniques include masking, encryption, and tokenization, ensuring that re-identification requires access to separate, secured keys.

6. Data Sharing

6.1 Third-Party Integrations

We may share data with third-party vendors (Venues and technology partners) necessary for service delivery. These parties are bound by confidentiality agreements and data processing agreements that restrict the use of your data for any purpose other than providing the services we have contracted them for. We carefully select our partners and ensure they have appropriate security measures in place to protect your data.

6.2 Cross-Border Data Transfers

Your data may be transferred to and processed in jurisdictions outside India where our cloud service providers or technology partners operate. We will ensure that any such transfers comply with applicable Indian data protection laws, including obtaining your explicit consent where required and implementing appropriate safeguards, such as standard contractual clauses or binding corporate rules, to protect your data.

7. User Rights

You have the following rights regarding your data:

  • Access: Request access to your data and processing details. You can request a copy of your personal data that we hold, as well as information about how we process it.
  • Correction: Request correction of inaccuracies in your data. You can request that we correct any errors or outdated information in your data.
  • Erasure: Request deletion of your data, subject to legal requirements and legitimate business interests. You can request that we delete your data under certain circumstances, such as when it is no longer needed for the original purpose or when you withdraw consent.
  • Portability: Request a copy of your data in a csv format. You can request a copy of your data in a commonly used electronic format so you can transfer it to another service provider.
  • Objection: Object to the processing of your data for direct marketing or research purposes. You can object to the use of your data for these purposes, and we will respect your preferences.

8. Data Breach Notification

In the event of a data breach, we will notify affected users and relevant authorities in accordance with legal requirements. We will take prompt action to investigate the breach, contain the damage, and implement measures to prevent future breaches. We will also provide affected users with information about the breach and steps they can take to protect themselves.

Our incident response plan outlines procedures for identifying, assessing, and containing data breaches. This includes prompt notification of affected users and relevant authorities, as per legal requirements, and implementing remedial measures to prevent future occurrences.

9. Data Retention

We retain personal data only as long as necessary to fulfil the purposes outlined in this Policy, comply with legal obligations, resolve disputes, and enforce our agreements. Specific retention periods are determined based on the type of data, the nature of the services provided, and applicable legal requirements, including those mandated by accounting standards. After the retention period, data will be securely deleted or anonymized using appropriate methods, such as secure erasure or irreversible pseudonymization.

10. Grievance Redressal

If you have any questions or grievances, contact our Grievance Officer: **Name:** Yogesh Bansal **Email:** legal@livegig.me **Address:** Dwarika Heights, Eastern By-Pass, Darjeeling, India We will address your grievance in a timely and efficient manner and provide you with a clear explanation of our decision. You also have the right to lodge a complaint with the relevant data protection authority if you are not satisfied with our response.

11. International Compliance

While our primary focus is India, we align with global data protection standards such as GDPR and HIPAA, anticipating potential international expansion. We will ensure that our data practices comply with the relevant data protection laws in any jurisdiction where we operate.

12. Policy Updates

This Privacy Policy may be updated periodically to reflect changes in our Services, legal requirements, or industry best practices. We will notify users of material changes through our website or direct communications. We encourage you to review this Privacy Policy regularly to stay informed about our data practices.

13. Contact Us

For questions about this Privacy Policy, contact us at legal@livegig.me

By using Live Gig Services, you acknowledge that you have read and understood this Policy and agree to its terms.