Privacy Policy
Last Updated: January 2026
Welcome to Bodhiyo, a platform developed and operated by Heuristech. Your privacy is important to us. This Privacy Policy explains how we collect, use, protect, and manage your information when you use our platform, services, website, and related communication channels.
By using Bodhiyo, you agree to the terms outlined in this Privacy Policy.
1. Information We Collect
We may collect the following types of information:
Personal Information
- Full name
- Phone number
- Email address
- Profile photo
- Location information
- Language preferences
Professional Information
- Skills and work experience
- Job preferences
- Certifications and training details
- Employment history
- Workforce category details
Usage Information
- Device information
- Browser type
- IP address
- Platform interactions
- Session activity
Communication Information
- WhatsApp conversations
- Support requests
- Feedback and survey responses
2. How We Use Your Information
We may use the information collected for the following purposes:
Service Improvement
- Enhancing the user experience
- Personalizing content and recommendations
- Analyzing usage trends
Communication
- Sending updates and notifications
- Responding to inquiries and comments
- Providing customer support
Marketing Purposes
- Sending promotional materials
- Conducting market research
- Inviting to events and webinars
Legal Compliance
- Ensuring compliance with laws and regulations
- Preventing fraud and abuse
- Responding to legal requests
4. Your Rights
You have the following rights regarding your information:
Access
- Request copies of your personal information
- Obtain information about how we process your data
Correction
- Request correction of inaccurate or incomplete data
- Update your information as necessary
Deletion
- Request deletion of your personal information
- Withdraw consent for processing
Opt-Out
- Opt-out of marketing communications
- Limit the use of your information
5. Data Security
We take the security of your information seriously, and employ various measures:
Encryption
- Using encryption technology for data storage and transmission
- Regularly updating security protocols
Access Controls
- Limiting access to authorized personnel
- Conducting regular security audits
Incident Response
- Establishing a clear protocol for data breaches
- Notifying affected individuals when necessary
User Education
- Providing resources on protecting personal information
- Encouraging safe online practices