
This page provides core information on grievance redressal, KYC & data protection, user consent, access control, compliance (including RBI oversight), disclaimer, a compliance checklist, and additional legal terms. Content is presented in clear paragraphs and lists for strong readability and consistent interaction.
Grievance Redressal
For complaints or concerns, please email contact@thunilsupertech.com. We respond within a reasonable time frame and process requests in line with our regulatory obligations.
KYC & Data Protection
We follow secure and compliant KYC procedures and data processing practices, including encrypted transmission, controlled access, data minimization, and compliant retention and deletion, in accordance with applicable laws and regulations.
- Secure storage: sensitive data is protected and encrypted.
- Encrypted transmission & processing: industry-standard encryption across the flow.
- Retention & deletion: statutory retention periods and compliant deletion mechanisms.

Consent
We obtain user consent with clear purposes and scope; for cross-border transfers or sharing, we provide additional prompts and secure consent where necessary. Users may withdraw consent within legal limits, which may affect the availability of certain services.
- Scope of consent: information collection, risk evaluation, regulatory reporting and audit.
- Withdrawal: compliant withdrawal mechanisms and clear communication of potential impacts.
Access Control
We implement role-based authorization and audit trails to ensure access to user information is limited to necessary scopes, with alerts and responses for abnormal access.
- Role-based authorization: least-privilege access aligned to responsibilities.
- Audit & alerts: access logging and abnormal event alerting.
Compliance
We operate strictly under applicable laws and regulatory frameworks, including but not limited to RBI requirements, and continuously strengthen internal compliance policies and training.
- Regulatory reporting and registrations
- Anti-Money Laundering / Counter-Terrorism Financing
- Information security and privacy protection
- Audit and internal controls
Disclaimer
This page is informative and does not constitute any promise or guarantee. To the extent permitted by law, we are not liable for outcomes resulting from use or interpretation of the information herein.
Additional Legal Terms
If there is any inconsistency with the Privacy Policy or Terms of Service, the updated legal documents shall prevail. We may update related provisions due to policy changes, regulatory requirements, or business adjustments.
Changes to Legal Information
If this page is updated, we will notify users within a reasonable scope via announcements or email. Please review the latest version periodically to stay informed.