Data Privacy
Data Protection & Privacy Policy
Effective Date: 30/06/2025
This policy outlines the principles and practices adopted by DESCAM Cybersecurity LLP to ensure the
privacy, protection, and secure handling of data when using the DESCAM: GUPTKOSH encryption
decryption system.
1. Zero Data Collection Policy
DESCAM: GUPTKOSH is built on the foundation of maximum client privacy.
• We do not collect, store, or transmit any files uploaded by the client.
• All data processing (encryption and decryption) is performed locally on the client’s system.
• No file content is ever transmitted to our servers (or any third party) at any point.
You retain 100% ownership and control over your data.
2. Legal Logging (As Required by Indian Law)
While DESCAM Cybersecurity LLP does not collect file content, we do maintain minimal and non
invasive logs, strictly for legal compliance and audit purposes.
• Logs include limited metadata such as timestamps of encryption/decryption and system
status (e.g., success/failure).
• These logs are stored locally or securely on restricted servers and are only accessible to
authorized personnel.
• These are maintained only to comply with Section 67C of the Information Technology Act,
2000 regarding retention of information by intermediaries.
No content, filename, IP address, or user personal data is extracted or monitored.
3. Commitment to Zero Backdoors or Surveillance
DESCAM: GUPTKOSH is designed to be fully tamper-proof and transparent:
• There are no backdoors, spyware, hidden logging, or surveillance systems embedded in any
version of the software.
• DESCAM guarantees that no third party, including ourselves, can access encrypted client
data.
• Every file is encrypted using client-side cryptographic logic, making it inaccessible to anyone
without authorized credentials and keys.
Our software respects your right to digital privacy and data ownership.
4. 100% Confidentiality of Client Data
All files processed by DESCAM: GUPTKOSH are treated as strictly private and confidential.
• DESCAM Cybersecurity LLP does not share, disclose, rent, or sell any client data to any
individual or organization.
• However, in the event of a lawful request by Indian government authorities under applicable
legal provisions, DESCAM is obligated to cooperate and share data as required.
Even in such cases, only log data or lawfully retained keys, if applicable, may be disclosed. File
contents are never stored or accessible.
5. Legal Compliance: IT Act 2000 & Digital Personal Data Protection Act, 2023
DESCAM: GUPTKOSH operates in full compliance with the Information Technology Act, 2000, as well
as the Digital Personal Data Protection Act, 2023 and all upcoming regulatory frameworks under the
MeitY (Ministry of Electronics and Information Technology, Govt. of India).
• Our systems are designed to follow privacy by design, security by default, and data
minimization principles.
• We adhere to the highest standards of data encryption, key protection, and device-specific
access control.
Clients have the right to transparency and control, and DESCAM ensures that all data operations are
verifiable, auditable, and protected under Indian legal provisions.
Terms & Conditions
Effective Date: 30/06/2025
These Terms and Conditions ("Agreement") govern your use of the DESCAM: GUPTKOSH encryption
decryption software provided by DESCAM Cybersecurity LLP.
1. Scope of Service
DESCAM: GUPTKOSH is a military-grade encryption-decryption system that enables clients to encrypt
and decrypt all types of digital files using our proprietary secure framework.
2. Licensing and Subscription
DESCAM: GUPTKOSH is offered strictly as a Software-as-a-Service (SaaS) model. Subscription periods
are available for durations of 1 year to 4 years, renewable upon agreement by both parties.
3. Intellectual Property Rights
a] All source code, software binaries, frameworks, algorithms, keys, and accompanying technical
materials related to DESCAM: GUPTKOSH are the intellectual property of DESCAM Cybersecurity
LLP.
Unauthorized use, duplication, reverse engineering, or redistribution is strictly prohibited. Violators
will be subject to strong legal action under applicable provisions of the Indian Copyright Act, 1957,
and other relevant laws.
b] All files processed (encrypted/decrypted) by the client using DESCAM services remain the
intellectual property of the client. DESCAM will only store logs or metadata strictly as required by
Indian laws or under court-issued warrants.
4. Security and Sharing Restrictions
The user/client/subscriber agrees:
• Not to share any software code, license file, installer .exe, .zip package, or related tool
components with third parties.
• Every installation is bundled with a custom-built security layer to prevent unauthorized
sharing or duplication.
If any unauthorized access, reverse engineering, or file sharing attempt is detected:
• The service will be terminated immediately without refund.
• No compensation will be provided for terminated access.
• Legal action and contractual fines will be pursued as per agreement and relevant Indian
cybersecurity and contractual law.
5. Payment & Refund Policy
• All payments are to be made online only via approved digital channels. No offline or cash
payments will be accepted.
• Refund requests will be entertained only if the subscription is canceled within 7 days of
payment.
• Upon cancellation:
o All associated files, software, and executables will be deleted by the DESCAM
installation officer.
o Refund will be processed to the original payment source within 7 working days.
6. Confidentiality Agreement
The client/user/subscriber agrees not to share, reproduce, or distribute:
• This contractual agreement or its contents
• Any confidential operational knowledge or deployment materials
Such disclosure is only permitted under lawful order from the Indian Government.
7. Termination Clause
Violation of any clause in this agreement, including but not limited to misuse, unauthorized
distribution, or breach of confidentiality, shall result in:
• Immediate termination of services
• Forfeiture of any pending refunds
• Possible legal action under Indian law
8. Jurisdiction
All disputes, claims, or legal proceedings arising from this agreement shall be subject to the exclusive
jurisdiction of the competent courts in Nagpur, Maharashtra, India. This agreement shall be
governed in accordance with the Laws of the Republic of India.
User_implementation
This policy outlines the implementation procedures, usage guidelines, and enforcement measures for
clients subscribing to the DESCAM: GUPTKOSH Encryption-Decryption System.
1. Installation & Onboarding
To ensure the highest level of security and integrity:
• A designated Installation Officer from DESCAM Cybersecurity LLP will personally install the
DESCAM: GUPTKOSH system on the authorized device of the client.
• Installation includes configuring multiple proprietary encryption layers and secure runtime
protections.
• Within 1 hour of installation, the entire system will be fully operational.
User Interface and Operation:
• The DESCAM interface is minimalistic, secure, and user-friendly:
o Upload your file via the "Encrypt" tab and click “Encrypt”.
o Encryption is instantaneous, typically completed within 5 seconds.
o For decryption, navigate to the "Decrypt" tab, upload the .descam file, and click
“Decrypt”.
o Upon successful decryption, a “Download” button will appear to retrieve the
original file.
No technical expertise is required from the client’s side. All cryptographic complexity remains fully
abstracted under our system's secure layers.
2. Security and Tamper-Proof Guidelines
• Clients are strictly prohibited from:
o Modifying, reverse-engineering, or attempting to bypass any internal or external
security codes
o Sharing executable .exe files, key files, source code, or compressed files (.zip) with
any unauthorized individual or platform
o Attempting unauthorized duplication, patching, or removal of built-in encryption
protections
Any such attempts are considered direct breaches of contract and will result in:
• Immediate termination of all services
• No refund or compensation
• Heavy financial penalties as mentioned in the signed agreement
• Criminal proceedings under the applicable sections of the Information Technology Act, 2000
and Indian Penal Code
3. Prohibition on Source Code Sharing
• Under no circumstances shall any original content, algorithm, source file, compiled code,
internal configurations, key generators, or API libraries be:
o Distributed
o Published
o Sold
o Sent over cloud sharing systems
o Or replicated in any way
All underlying software frameworks used in DESCAM: GUPTKOSH are the exclusive intellectual
property of DESCAM Cybersecurity LLP and cannot be accessed, copied, or referenced by any client,
vendor, or third party.
Violation of this clause will be seen as willful intellectual property infringement.
4. Consequences of Breach
In the event of policy violation or misuse, the following actions may be initiated based on severity:
• Immediate disabling of the DESCAM system on the client device
• Permanent termination of the license without refund
• Legal notice served for breach of cybersecurity policy and confidentiality
• Fines up to ₹50,00,000 or more based on contractual terms and extent of the breach
• Criminal complaint under applicable sections of:
o The Information Technology Act, 2000
o The Copyright Act, 1957
o Indian Penal Code (IPC) Sections 403 (Dishonest Misappropriation), 406 (Criminal
Breach of Trust), and 420 (Cheating)
Additionally, the client may be blacklisted from future security service agreements by DESCAM
Cybersecurity LLP.
Traning & implementation
This policy defines the operational framework and responsibilities associated with the installation,
setup, and basic training required to implement DESCAM: GUPTKOSH securely and effectively in
client environments.
1. Local Installation Only
DESCAM: GUPTKOSH is a locally installed security tool. The software runs entirely on the authorized
device of the client without requiring internet access or cloud-based infrastructure.
• No centralized server or SaaS dependency.
• All files remain on the user’s machine.
• This structure supports maximum data privacy and offline protection.
2. Compatible Platform: Microsoft Windows
The tool is developed and optimized for:
• Microsoft Windows 10/11 (64-bit)
• Supports all modern Windows security and UAC (User Account Control) models
• Not currently available for Linux or macOS platforms (subject to future releases)
Note: Windows Defender or antivirus programs should be temporarily disabled during installation for
smooth execution.
3. Installation Performed by DESCAM Installation Officer
To ensure complete control and confidentiality:
• Only a certified DESCAM Installation Officer will install the tool on-site or through a secure
remote session.
• Each installation is customized with device-specific encryption, unique runtime logic, and
tamper-detection mechanisms.
• The officer will also:
o Guide the user on basic operations (encryption/decryption)
o Perform an integrity test of the installation
o Ensure no open access to the source code or critical components
The officer removes all unnecessary files, debug components, or installer stubs after setup to
prevent unauthorized replication.
4. Roles and Responsibilities
DESCAM Cybersecurity LLP
• Provide secure and updated installation package
• Assign trained personnel for installation and demonstration
• Customize and secure the environment for each deployment
• Offer operational training (basic walkthroughs) during installation
• Ensure all software IP is protected and cannot be reused or copied
• Monitor and record deployment logs for compliance
Client / IT Team
• Provide a suitable Windows environment with admin access
• Cooperate in ensuring security permissions for installation
• Refrain from installing third-party tools that may interfere with the DESCAM system
• Avoid making unauthorized changes to the software or its environment
• Ensure physical access to the device is secure
• Maintain the confidentiality of device, key files, and access credentials
User & Device Restriction Policy
Effective Date: 30/06/2025
This policy defines the device-level security enforcement, license restrictions, and access control
regulations related to the DESCAM: GUPTKOSH encryption-decryption system.
1. Device-Bound Licensing & Authorized Key Access
DESCAM: GUPTKOSH is licensed strictly on a per-device basis.
Each installation is locked and protected using:
• A unique hardware ID
• A DESCAM-generated license key
• A private runtime logic
Only users with a valid DESCAM: GUPTKOSH license and system key can operate the software. Any
attempt to replicate or transfer the license without authorization will result in instant deactivation
and legal consequences under contract law.
2. Controlled Reinstallation or Transfer to Another Device
Reinstallation or device change is strictly controlled to prevent piracy or unauthorized propagation.
• Self-reinstallation is not allowed.
• If a device change or reinstallation is required, the client must officially contact DESCAM
Cybersecurity LLP.
• A certified DESCAM Installation Officer will:
o Transfer all keys and files securely
o Delete the older instance
o Reactivate the license on the new device
Any attempt to clone or reinstall the software independently may result in:
• Complete file destruction
• License cancellation
• Permanent service suspension
• Breach of contract with applicable fines
3. Unauthorized Access Strictly Prohibited
Clients are forbidden from:
• Sharing the software with any unauthorized user
• Granting remote desktop or physical access to other individuals for using DESCAM:
GUPTKOSH
• Running or copying .exe, .zip, or internal data files of the DESCAM system onto unregistered
devices
DESCAM’s security layers are equipped with tamper detection systems. If unauthorized access is
detected, the tool will:
• Automatically disable core functionality
• Log the breach
• Lock access permanently
• Initiate a self-destruct mechanism (optional based on contract)
4. Legal Enforcement
Violation of this policy constitutes a direct breach of legal agreement signed between the client and
DESCAM Cybersecurity LLP.
Consequences may include:
• Suspension or termination of service
• Monetary penalties as per contractual clauses
• Civil and/or criminal proceedings under the Information Technology Act, 2000 and Indian
Contract Law
Why DESCAM: GUPTKOSH Policies Are Strict
At DESCAM Cybersecurity LLP, our commitment is not just to provide encryption, it is to guarantee
uncompromised, military-grade security. The policies around DESCAM: GUPTKOSH are intentionally
strict and zero-tolerance for the following reasons:
1. National and Enterprise-Grade Sensitivity
The tool is designed for high-stake environments, defense, government, legal, finance, and
enterprise data handling where even the smallest leak, reverse-engineering attempt, or mishandling
could lead to:
• Corporate espionage
• Critical data loss
• Legal liabilities
• Cyber attacks
Strict policies ensure no unauthorized sharing, inspection, or misuse can occur technically or legally.
2. Proprietary Multi-Layered Security
DESCAM: GUPTKOSH integrates a proprietary multilayer-layer encryption system
This architecture is not open-sourced and protected by DESCAM IP laws. Policies prevent any
reverse-engineering, code access, or unauthorized duplication that might compromise the system’s
uniqueness and effectiveness.
3. Licensing Integrity
Every installation is licensed with:
• A unique device access
• Security checks that monitor for sharing
• Tamper detection triggers
Strict policies ensure that each license is used only for the client it was issued to, eliminating
software piracy or cloning risks.
4. Legal Compliance and Accountability
We align fully with:
• Information Technology Act, 2000
• Indian Contract Act, 1872
• Indian Copyright Act, 1957
• Provisions of the DPDP Act (upcoming)
Strict client-side policies help enforce traceability, responsibility, and lawful usage, making it easier
to investigate and respond to violations.
5. Preventing Internal Threats
Often, the greatest threats come from inside disgruntled employees, accidental file sharing,
unauthorized third-party tools.
DESCAM: GUPTKOSH policies are built to protect companies from themselves enforcing:
• No code access
• No internal distribution
• No forced decryption
• Full termination and fines on breach
6. Trust-Based B2B Model
We aim to build long-term trust with every enterprise client. That’s only possible when:
• Your IP remains your IP
• Our software remains untampered
• Your risk of breach is near-zero
Strict policies ensure that every party in this system is held accountable technically and legally.