Privacy Policy

At Odelya, we are committed to protecting your privacy and securing your data with military-grade encryption. This policy outlines how we collect, use, and protect your information. We believe in complete transparency about our data practices and your privacy rights. Our zero-knowledge architecture ensures that only you can access your encrypted data. We never compromise on security and privacy—they are at the core of everything we do.

Effective Date: Jan, 2025

Our Commitment

Odelya Management Pvt. Ltd. ("Odelya", "we", "our", "us") respects your privacy and is committed to protecting your personal and confidential data. We implement industry-leading security measures to ensure your information remains private and secure at all times. Our privacy-first approach means we design our services with your privacy as the foundational principle.

This Privacy Policy applies to all services offered by Odelya, including our Cloud Digital Locker, secure storage solutions, and any related services. By using our services, you agree to the collection and use of information in accordance with this policy. We periodically review and update this policy to reflect changes in our services and legal requirements.

Our commitment extends beyond legal compliance—we aim to set the standard for privacy and data protection in the cloud storage industry. We believe that true privacy means you control your data completely.

Information We Collect & Our Zero-Knowledge Approach

Your Data, Your Control

We adhere to a strict minimal data collection policy and implement true zero-knowledge architecture. Your privacy is not an afterthought—it's built into our foundation from the ground up.

What We Collect:

  • Account Profile: Name, email, and contact information for account management and communication
  • Authentication Data: Encrypted login credentials and security tokens to protect your account
  • Service Metadata: Account status, subscription type, storage usage, and service settings
  • Encrypted Indicators: Only encrypted file identifiers (not contents) for storage management and organization
  • Payment Information: Processed securely through PCI-compliant payment gateways (we never store full payment details)
  • Communication Data: Correspondence with our support team to improve service quality and resolve issues

What We Never Access:

  • File Contents: We cannot read or access your stored files—they remain encrypted at all times
  • File Names: File names are encrypted client-side before being sent to our servers
  • Metadata: File details, sizes, types, and modification dates are all encrypted
  • Decryption Keys: Keys never leave your device in unencrypted form—only you hold the key
  • Folder Structures: Your organizational structure and folder hierarchy remain completely private

Zero-Knowledge Architecture Explained

Zero-Knowledge Means: Your data is encrypted on your device before upload. We store only encrypted blobs that are meaningless without your private key. Even if compelled, we cannot provide access to your unencrypted data. This architecture ensures that only you hold the keys to decrypt and access your information. The encryption happens locally on your device, and only encrypted data travels to our servers.

Data Retention & Deletion Policy

Our Retention Principles

We retain your personal data only for as long as necessary to provide our services and fulfill legal obligations. Our approach balances service functionality with your right to privacy.

  • Active Accounts: Data retained while your account remains active and in use
  • Inactive Accounts: Provide notification after 2 days of inactivity, with options for extension or deletion
  • Account Deletion: Complete data deletion within 24 hrs of account diactivation
  • Legal Requirements: Certain data may be retained as required by Indian laws and regulations, but always in encrypted form

When you delete files from your Odelya Digital Locker, they are immediately removed from your accessible storage. The encrypted data remnants are permanently erased from our servers within 24 hrs through secure deletion protocols that meet NIST 800-88 standards for media sanitization.

Secure Deletion Guaranteed

We implement cryptographic erasure techniques that make data recovery impossible. Once deleted, your data cannot be recovered by anyone—including Odelya staff. This ensures true data deletion, not just "soft deletion" or archiving.

How We Use Your Information

Your information is used exclusively to enhance and provide our services with the highest standards of privacy and security. We never use your data for purposes unrelated to delivering and improving our services.

  • Service Delivery: To deliver secure cloud storage and digital locker services with maximum reliability and performance
  • Payment Processing: To process payments and manage your service subscription through secure, PCI-compliant channels
  • Communication: To communicate important service updates, security notices, and maintenance schedules
  • Legal Compliance: To comply with legal obligations and regulatory requirements while protecting your privacy
  • Service Improvement: To improve our services and develop new security features based on aggregated, anonymized usage patterns
  • Customer Support: To provide customer support and respond to your inquiries with personalized, helpful assistance
  • Security Protection: To detect and prevent fraud, abuse, and security incidents through automated monitoring systems

We never use your personal data for advertising purposes or sell it to third-party advertisers. Any analytics we perform are done on aggregated, anonymized data that cannot be traced back to individual users. Our business model is simple: you pay for a premium service, and we provide it without compromising your privacy.

Transparency Promise: We will always be clear about how we use your data. If our data practices change, we will update this policy and notify you in advance.

Data Security

End-to-End Encryption Active

All data stored with Odelya is protected using military-grade, end-to-end encryption. This means your files are encrypted before they leave your device and remain encrypted until accessed by you with your unique decryption key. Our security architecture is designed so that we never have access to your unencrypted data.

We employ multiple layers of security that work together to protect your information:

  • 256-bit AES Encryption: Military-grade encryption for data at rest, using the same standard adopted by governments worldwide
  • TLS 1.3 Encryption: State-of-the-art encryption for data in transit, protecting your data as it moves between devices and our servers
  • Zero-Knowledge Architecture: Fundamental design principle that ensures we cannot access your files, even if we wanted to
  • Regular Security Audits: Independent third-party security audits and penetration testing conducted annually
  • Multi-Factor Authentication: Optional but recommended additional security layer for account access
  • Secure Key Derivation: Using PBKDF2 with high iteration counts to protect against brute-force attacks
  • Geographically Distributed Data Centers: Enterprise-grade facilities with physical security, redundancy, and environmental controls
  • Continuous Monitoring: 24/7 security monitoring for suspicious activities and potential threats

Our security team continuously monitors for vulnerabilities and implements patches promptly. We undergo independent security audits annually to verify our security claims and maintain compliance with industry best practices. Security is not a feature—it's our foundation.

Security Beyond Encryption

Beyond encryption, we implement defense-in-depth strategies including network segmentation, intrusion detection systems, and regular security training for all employees. Our security practices are regularly reviewed and updated to address emerging threats in the cybersecurity landscape.

Third-Party Sharing

We do not sell, rent, or trade your personal data to third parties. Your privacy is our priority and we maintain strict control over your information. We believe your data should remain yours, not become a commodity.

Data may be shared only in the following specific, limited circumstances:

  • Legal Requirements: When required by law or legal process, and only to the extent specifically required
  • Essential Service Providers: With carefully vetted service providers who assist in delivering our services, under strict confidentiality agreements that match or exceed our privacy standards
  • Safety & Security: To protect the rights, property, or safety of Odelya, our users, or the public from imminent harm
  • With Your Consent: With your explicit, informed consent for specific, limited purposes that you authorize

Our service providers (such as payment processors, infrastructure providers, and support tools) are carefully vetted and bound by contractual obligations to protect your data. They are only provided with the minimum information necessary to perform their specific functions, and they are prohibited from using your information for any other purpose.

Our Commitment to You

We will notify you of any third-party data sharing (except where prohibited by law) and will challenge any data requests we believe to be overbroad or without proper legal basis. Transparency is core to our privacy values. We maintain detailed logs of all data disclosures and will provide you with access to these logs upon request, subject to legal limitations.

International Data Transfers & Compliance

GDPR & DPDPA Compliant

Odelya operates primarily from data centers located within India, ensuring that your data remains subject to Indian privacy laws including the Digital Personal Data Protection Act (DPDPA), 2023. We maintain the highest standards of data protection regardless of where you access our services from.

Cross-Border Data Protection:

  • Primary Storage: All user data is stored within Indian borders in secure, certified data centers
  • Backup Locations: Encrypted backups may be stored in secure locations with adequate data protection laws equivalent to or stronger than Indian standards
  • EU Users: We comply with GDPR requirements for European users, including data subject rights and lawful transfer mechanisms
  • Data Processing Agreements: We maintain DPAs with all international service providers that include strict data protection obligations
  • Transfer Mechanisms: We use approved data transfer mechanisms (such as Standard Contractual Clauses) when cross-border transfers occur
  • Jurisdictional Protections: We assess the legal environment of any country where data might be processed to ensure adequate protections

Regardless of where your data is processed, it remains encrypted with your keys. We ensure that all data transfers comply with applicable data protection laws and maintain the same level of protection described in this policy. The encryption ensures that even if data crosses borders, it remains inaccessible without your decryption key.

Global Privacy Standards: We design our services to meet or exceed privacy standards worldwide, not just the minimum required by any single jurisdiction.

Your Rights

You have comprehensive control over your personal data. Under applicable privacy laws, you have the right to:

  • Access Right: Access the personal information we hold about you in a clear, readable format
  • Correction Right: Request correction of inaccurate or incomplete information to ensure data accuracy
  • Deletion Right: Request deletion of your personal data (subject to legal obligations and our zero-knowledge architecture limitations)
  • Objection Right: Object to or restrict certain processing of your information for specific purposes
  • Portability Right: Receive your data in a portable, structured format that you can transfer to another service
  • Consent Withdrawal: Withdraw consent for data processing where applicable, without affecting prior lawful processing
  • Complaint Right: Lodge a complaint with relevant data protection authorities if you believe your rights have been violated

To exercise any of these rights, please contact us at care.ompl@gmail.com. We will respond to your request within 30 days. For security purposes, we may need to verify your identity before processing certain requests to prevent unauthorized access to your account.

Important Note About Zero-Knowledge Architecture

Due to our zero-knowledge encryption, we cannot recover your encrypted data if you lose your password or encryption key. This is a fundamental security feature, not a limitation. We strongly recommend using our secure key backup feature and maintaining your recovery information securely. Your data security is in your hands—we've designed it that way intentionally to ensure that only you can access your data. This means we cannot bypass your encryption even if you ask us to.

Contact Us

If you have any questions about this Privacy Policy or how we handle your data, please don't hesitate to contact our privacy team. We're here to help and ensure you feel confident about your privacy with Odelya. We welcome your questions, concerns, and feedback about our privacy practices.

Administrative Office

Address: 44E, 2nd Floor, Nandalalmitra Lane,
Tollygunge, Kolkata,
West Bengal 700040, India

Phone: +91-96741 30001

Hours: Monday-Sunday: 11:00 AM - 6:00 PM

Email: care.ompl@gmail.com

View on Google Maps

Registered Office

Address: Molina Apartment, 1st Floor,
32/10 Chandi Ghosh Road, Tollygunge,
Kolkata, West Bengal 700040, India

Phone: +91-96741 30001

Hours: Monday-Friday: 10:00 AM - 12:00 PM

Email: care.ompl@gmail.com

View on Google Maps

Privacy Contact Information

Company: Odelya Management Pvt. Ltd.

Headquarters: Tollygunge, Kolkata, India

Privacy Email: care.ompl@gmail.com

Privacy Helpline: +91-96741 30001

Response Time: Within 24-48 hours for privacy-related inquiries

Data Protection Officer: Available upon request for formal data protection matters

Languages: English, Hindi, Bengali - All privacy communications available

This policy was last updated in January 2025 and may be updated periodically to reflect changes in our services or legal requirements. We will notify users of any material changes through our website or direct communication. Continued use of our services after changes constitutes acceptance of the updated policy.

Privacy by Design | Security by Default