• +079 41050677
  • info@idltechnologies.com

Little More About Us

The human factor is a fundamental aspect of our business. According to the unwritten IT law, the quality of the product is only as good as the team that produced it. That is why IDL Technologies’ capital asset is a team of united, like-minded professionals.

Our leadership team exudes passion for software advancement and customer satisfaction. Our HR policy is to grow our own forces from the young and talented people rather than hiring mature skilled experts from the street. Besides keeping employee turnover at a minimum, this strategy helps us to build strong professional project teams where everybody shares the Company’s values.

Our dedicated employees have broad experience

Each and every one of our employees represent the spirit of our company: driven, committed, and acutely aware of how limitless Hanover’s potential is to grow. We go to great lengths to identify self-starters with diverse experience and skill sets to produce not just an effective workforce, but a well-rounded, talented and complementary team.

Our dedicated employees love their work!


Chief Marketing Officer/VP Marketing/Content Manager:

Our team member overseeing and managing all tactical execution of our marketing plan and responsible for analyzing results and continually tweaking efforts over time.

Developement Team:

The Development Team is divided into functional groups depending on the employees’ experience and skills. Role assignments are made according to the process selected for the given project. For medium- and large-sized projects, a project team consists of the following groups:
  1. Management (project and group leaders);
  2. Analysis and Design (system analysts and system architects);
  3. Engineering (developers, database administrators);
  4. Quality Assurance and Control (reviewers, testers, test designers);
  5. Design and Usability (art designers, interface designers);
  6. Technical Writers and Translators.

Social Media Marketer/Communications Expert:

Marketing all comes down to regularly communicating with audience, so we really need someone who can be actively participating in online and offline discussions with customers. Our Marketing team carry our software company’s voice out into the world. In addition to social media platforms like Twitter, Facebook, LinkedIn, etc., our team actively engaged on relevant message boards and community boards.


Keywords are just one aspect of what your SEO expert should manage. Our expert team also be looking at our overall content library, backlinks and make recommendations for improving the quality of your SEO rankings.

We have successfully partnered with a wide range of companies including distributors, vendors, retailers, consultants, systems integrators (SI), technology deployment consultancies, value-added resellers (VARs), media platforms developers and multinational solution providers. Partners play a critical role in equipping developers and testers with IDL Technologies best-in-class products.

The partnership is led by the objective for growing a business for mutual success. By becoming our partner you can take on bigger business challenges, capitalize on emerging techs, grow your market share, and increase your profit margin.

Become our next Partner

We understand the real value of loyal, long-term business partnerships. This is why we are ready to go the extra mile and tailor our partnership options to your specific business needs and expectations. Let’s touch base today and get the ball rolling!


  • Long-term partnership for mutual benefits
  • World-class development environment
  • Sales and Marketing Resources
  • Technical Resources
  • Make community collaboration a reality
  • Offer quality rather than services at cheap prices
  • Innovative & strategic solutions

Anim pariatur cliche reprehenderit, enim eiusmod high life accusamus terry richardson ad squid. 3 wolf moon officia aute, non cupidatat skateboard dolor brunch. Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor, sunt aliqua put a bird on it squid single-origin coffee nulla assumenda shoreditch et.

Anim pariatur cliche reprehenderit, enim eiusmod high life accusamus terry richardson ad squid. 3 wolf moon officia aute, non cupidatat skateboard dolor brunch. Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor, sunt aliqua put a bird on it squid single-origin coffee nulla assumenda shoreditch et.

Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor, sunt aliqua put a bird on it squid single-origin coffee nulla assumenda shoreditch et. Nihil anim keffiyeh helvetica, craft beer labore wes anderson cred nesciunt sapiente ea proident. Ad vegan excepteur butcher vice lomo. Leggings occaecat craft beer farm-to-table, raw denim aesthetic synth nesciunt you probably haven't heard of them accusamus labore sustainable VHS.

Here we explains the Terms of Use for IDL Technologies Services, legal and privacy notices for details on how we collect, use and protect your personal information on the website, our security issue disclosure process and information on software products that are accessible by individuals with visual, auditory, and mobility impairments.

  1. Application:

    These conditions alone shall govern and be incorporated into every contract for the provision of services incorporating bespoke development entered into by Sett Software Ltd t/a Sett known hereinafter as the Provider a Client known hereinafter as the Client. These conditions shall apply in place of and prevail over any terms and conditions of the buyer. No variation of these terms and conditions shall be effective unless expressly agreed by the Provider in writing.

  2. Quotations and Acceptance:

    • Proposals will be prepared by the Provider on the basis of information given in writing regarding by the Client regarding the Client's requirements and are for information only. A proposal is not to be considered an offer by the Provider. All proposals remain valid for FOURTEEN (14) days from the date of issue by the Provider to the Client unless otherwise agreed in writing by the Provider.
    • An order or instruction to commence development from the Client shall not be considered a contract between the Client and the Provider unless accepted by the Provider whereupon these Terms and Conditions will be deemed to have been accepted unconditionally by the Client IDL Technologies employees are required to acknowledge that they understand and will strictly abide by our corporate policies with respect to the confidentiality of user personal information. Passwords are regularly changed pursuant to security protocols.
    • Where the Client requests subsequent to the order such additional work as not contemplated by the proposal and/or outside the scope of the Client's requirements as communicated in writing prior to the preparation of the proposal the Provider reserves the right to levy additional charge at an hourly rate not excluding the provider's standard hourly rate for provision of such type of work.
  3. Cancellation:

    • Where a project is to be completed in stages, the Provider reserves the right to commence a development stage prior to the completion of stages preceeding that development stage as detailed in the Proposal and/or prior to the date upon which that stage was due to commence as detailed in the Proposal.
    • No order which has been accepted by the Provider may be cancelled by the Client unless agreed in writing by the Provider and on condition that the Client shall indemnify the Provider in full against all loss, costs, damages, charges and expenses incurred by the Provider as a result of the cancellation whether or not such loss costs damages charges and expenses were due to occur before on or after the date of cancellation.
  4. Client's Obligations:

    The Client shall afford the Provider such access to records information personnel and other material under the control of the Client as the Provider may reasonably require to provide the services detailed in the contract.

  5. Termination:

    1. The Provider may terminate the contract in the event that:
      • The Client fails to pay any amount due to the Provider under the Contract;
      • The Client fails to perform any of the obligations on its part to be performed pursuant to this Contract and such failure is not remedied by the Client within TWENTY-EIGHT (28) days after receiving notice requiring the Client to do so;
    2. Either party shall be entitled to terminate the contract in the event that the other party shall:
      • Commit a material breach of its obligations under the contract which (in the case of a breach which is capable of being remedied) shall not have been remedied within 28 days after receipt of a written request to do so;
      • pass a resolution for winding-up;
      • make any voluntary arrangement with its creditors or become subject to an administrative order;
      • have a receiver or administrative receiver or liquidator appointed;
      • ease to carry on business.
  6. Timescales:

    The Provider shall make reasonable efforts to meet agreed project and individual stage target commencement and completion dates; however the project plan shall not be contractually binding and times specified therein shall not be of the essence.

  7. Warranty and Liability:

    • The Provider warrants that the services will be performed with reasonable skills and care. All other warranties, conditions or other terms implied by statute or law are excluded to the fullest extent permitted by law
    • Where any valid warranty claim is made under the foregoing within 28 days of statement of delivery by the Provider the Provider will at its sole discretion make good any defect free of charge or grant credit to or refund to the Client the price of the project or project stage (or proportionate part thereof) provided that the Provider shall have no further liability to the Client.
    • Any liability in respect of a contract shall be limited to the price paid by the client under that contract.
    • The Provider may at any point prior to commencement of or within the warrenty period at its sole discretion request a definitive list of percieved bugs and or defects known hereinafter as a Snagging List from the Client, which shall once agreed by the Provider be considered full and final in respect of existing and future warrenty claims. Following stated rectification of items specified on the Snagging List, or failure by Provider and Client to agree on items to be contained within the Snagging List within FOURTEEN (14) days from the date of such a request by the provider, all obligations of the Provider to the Client shall be deemded to be satisfied.
    • The Provider shall be under no liability if the goods have not been paid for in full by the due date for payment.
  8. Force Majeure:

    The Provider shall not be liable to pay compensation for any loss consequential or otherwise caused by any delays caused directly or indirectly by uncontrollable events including failure by subcontractors or suppliers to deliver any goods or perform any services. Without prejudice to the generality of the foregoing uncontrollable events include acts of God war strikes industrial action short of a strike blackouts accidents fire blockade import or export embargo natural catastrophy or other obstacles over which the Provider has no control.

  9. Confidentiality:

    • Unless notified in writing by the Client any information or documentation supplied by the Client to the Provider shall not be deemed as confidential.
    • Any and all material supplied by the Provider to the Client in the performance of the Contract shall be deemed as confidential. The Client warrants that it will take all reasonable steps to avoid the disclosure of such material to third parties, and the Client indemnifies the Provider from any and all costs and losses associated with failure under the foregoing including but not limited to legal costs and consequential damages to the Provider brought about whether directly or indirectly by such failure.
    • Unless explicitly agreed in writing, under no circumstances will general information on the project its nature technologies employed and end user be regarded as confidential information and may form part of future case studies or press releases by the Provider.
  10. Third Party Components:

    • The Provider may at its sole discretion make use of intellectual property owned by organisations other than the Client or Provider and supplied under license including but not limited to libraries source code components or applications ("third party components") in fulfilment of the Contract.
    • The Client warrants that it will comply with any and all obligations applicable to Third Party Components by virtue of the license under which such Third Party Components are supplied and the Client indemnifies the Provider from any and all costs and losses associated with failure of the Client to comply with any and all obligations so arising including but not limited to legal costs and consequential damages to the Provider brought about whether directly or indirectly by such failure to comply.
  11. Intellectual Property:

    • All intellectual property including but not limited to copyright database right design right and patent developed by the Provider under the contract including but not limited to proposals plans documents source code database schemas and interpretable and executable code shall be deemed to belong to the Provider unless otherwise agreed by the Provider in writing and shall be licensed to the Client for use for the purpose and manner as described in the contract whereby the number of concurrent installations or copies of interpretable or executable code or database schemas utilised in a system operational for any purpose shall be ONE (1) unless otherwise agreed in writing by the Provider.
    • Such intellectual property must not be reproduced, and must not be disclosed, offered for sale, sold or otherwise transferred to a party other than the Client or Provider.
    • The Provider may at its sole discretion include such devices as it deems necessary to prevent the unauthorised use of its intellectual property including but not limited such unauthorised uses as described herein ("DRM"). The Client warrants that neither it nor its agents shall modify remove attempt to modify or attempt to remove such DRM devices.
    • The Client agrees to indemnify the Provider from any and all costs and losses associated with failure of the Client to comply with any and all obligations so arising including but not limited to legal costs and consequential damages to the Provider brought about whether directly or indirectly by such failure to comply.
  12. Non Solicitation:

    The Client agrees that it will not at any time either during the project or for a period of one year following completion or termination of the project without the prior written consent of the Provider directly or indirectly entice solicit or endeavour to entice or solicit away from the Provider any employee with whom the Client has come into contact in connection with the provision of services by the Provider.

  13. Payment:

    • The Client shall pay the price for the services in full within FOURTEEN (14) days following the date of invoice unless otherwise notified in writing by the Provider and or stipulated to the contrary by means of a payment schedule.
    • The fees charged by the Provider shall be exclusive of reasonable disbursement and expense items and VAT in respect thereof, incurred on behalf of the client and wholly and necessarily incurred in respect of the contract including but not limited to travel accommodation messenger services postage stationery and materials such disbursements being invoiced to the client at the end of the stage or project.
    • Where payment is not made by the Client by the due date in respect of any invoiced amount then all issued invoices whether dated before or after the due date of that invoice in respect of which there has been a default in payment shall become immediately due and payable in full. Where payment is not made by the Client by the due date in respect of any invoiced amount the Provider reserves the right to charge interest to the Client on the amount unpaid at the rate of 4% per annum above Barclays' base rate calculated on a daily rate. The Client agrees to indemnify the Provider in respect of all costs and losses associated with receiving late payment including but not limited to legal costs recovery costs and consequential damages to the Provider brought about whether directly or indirectly by such late payment.
  14. Variation:

    The Provider reserves the right to revise and amend these Terms and Conditions from time to time, which will be made available on the Providers website and by request.

    • The Provider may at any time assign, novate, transfer, charge, sub-contract or delegate any contract between the Provider and the Client to any third party and/or agent as the Provider may think fit, including the Provider transferring, assigning, charging, sub-contracting or delgating its rights and obligations to a third party.
    • The Provider is entitled to carry out any variations to its Terms and Conditions without the Client’s consent and/or permission. However, the Provider shall inform the Client about the variations by way of updating its Terms and Conditions on its website.
    • It is the Client’s responbility to regularly check the Provider’s website for any changes to its Term and Conditions, however, the Provider may exercise its discretions to inform the Clients by way of an e-mail or a letter as the Provider may think fit.
    • The Client shall contact the Provider within 48 hours of the variation to make a formal complaint, after 48 hours the variations shall be deemed accepted.
  15. Waiver:

    Forbearance or indulgence shown or granted whether in respect of these Terms and Conditions or otherwise shall not affect or prejudice the Provider's right against the Client or be taken as a waiver of these Terms and Conditions.

  16. Governing Law:

    Any contract incorporating these Terms and Conditions shall be governed by and construed in accordance with the laws of England and both parties hereby agree to submit to the jurisdiction of the English courts.

IDL Technologies respects your privacy. We recognize the potential of technology to help you communicate with our company via our website and through email and we would like to use this technology over time to develop a relationship with you. We have developed the following guidelines to ensure responsible use of any information you share with us electronically. Please read the following to learn more about our privacy policy. This privacy policy is incorporated into this document. If you do not agree to the terms of this privacy policy, please do not provide us any information and do not use our services. Your continued use of the our company services after read the privacy policy has been modified will signify your acceptance of the changes for information gathered after the date of the change.

Information That We Gather and Track:

IDL Technologies only collects personal information which is reasonably necessary for its dealings with the individuals to whom the information relates. The types of personal information IDL Technologies collects will depend on the particular dealings we have with you. However, generally, we collect and hold personal information about existing and prospective customers, our third party service providers and suppliers, and employment applicants. The types of personal information that we collect and hold about these individuals includes, but is not limited to: Personal identifiers, such as names, contact details (e.g. email address), job description and, if applicable, language spoken A customer’s payment details for the purpose of processing the purchase of our products and services Generally, IDL Technologies collects personal information directly from the individuals concerned. For instance, there are times when we may need to collect information from you through our Web Sites. This generally involves filling out forms so you can download or order a IDL Technologies or third party product from our Web Sites. When you download the products we require you to fill out a form with your name and email address. IDL Technologies may also collect personal information about individuals indirectly from third parties, such as from our business partners, from third party providers of marketing lists, and through various other methods, including:

  • Cookies
  • Referrers
  • IP addresses
  • System information
None of these methods can be used to identify, or reasonably identify, you with the exception of cookies, which can optionally store information that you may enter in forms on our Web Sites, as described below. IDL Technologies may use Globally Unique Identifiers (GUIDs) to notify us of the installation of one of IDL Technologies’s products. A "cookie" is an element of data that a Web Site can send to your browser, which may then store it on your system. It can be used to provide you with a tailored user experience. Some IDL Technologies pages use cookies. Cookies are used to better personalize the content, banners and promotions that you and other users will see. We may use the information to research and understand how our users’ habits in the aggregate are similar or different so that we can enhance your experience on IDL Technologies sites and with our products. With your consent, cookies can optionally store information from forms that you fill out on our site so that next time you visit, you do not have to re-enter this information. For example, this would allow you to enter your zip code (or local equivalent) so that next time you visit, you can automatically see local content from your area. You can set your browser to notify you when you receive a cookie, giving you the chance to decide whether or not to accept it. IDL Technologies does not require that you accept cookies. A "referrer" is the information passed along by a web browser that references the Web URL you linked from, and is automatically collected by our Web server. This information is collected and used by IDL Technologies to understand the web sites referring traffic to our download pages and to present appropriate content to our potential customers. Referrer information is tabulated by IDL Technologies on an aggregated basis to identify general trends and traffic patterns. From time to time, IDL Technologies may enter into agreements with content partners that require IDL Technologies to count the number of product downloads and/or product sales stemming from a referral from a content partner site. This information is collected, used and aggregated by IDL Technologies to fulfil the reporting requirements of those agreements. This information may also be combined with the referrer information described above and tabulated on an aggregated basis to identify general trends and traffic patterns. At the time of product download and/or purchase, information you provide to IDL Technologies, including personal information and referring URL’s, is collected in our web server logs and customer database and is kept strictly confidential and not shared with third parties. IP addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer so that data (such as the Web pages you request) can be sent to you. They are automatically gathered by our Web server. IDL Technologies will not use your IP address to attempt to identify your personal information. System information we gather includes time, type of Web browser being used, the operating system/platform, and CPU speed. This information is sent automatically by your Web browser when you are connected to a Web Site and is used by IDL Technologies only for broad demographic statistics. This information is used by IDL Technologies in identifying broad demographic trends and may be used to provide information appropriate for your computer system. You will not be personally identified from this information.

Security Measures:

IDL Technologies maintains controls to provide security over certain financial information you provide us, including credit card details, during the purchase process. This is evidenced through:

  • Use of secure connections using SSL to safeguard information when transmitted from the customer’s web browser to IDL Technologies.
  • Logical authentication security within the databases that store customer’s credit card numbers.
IDL Technologies employees are required to acknowledge that they understand and will strictly abide by our corporate policies with respect to the confidentiality of user personal information. Passwords are regularly changed pursuant to security protocols. IDL Technologies transmits customer credit card information through a third party payment processor to its third party bank to process and complete credit card transactions. These third parties transmit and store the personal and financial information provided by customers for credit card transactions through secure systems with security technology, encryption and firewall protection. Please note that these vendors have their own privacy policies, and although IDL Technologies’s agreement with them does not allow the other transacting party to use this information for anything other than providing payment services, IDL Technologies is not responsible for their actions, including their information protection practices. You may prevent having IDL Technologies use, transmit or share your personal and financial information for credit card transactions by not providing the information for this purpose and choosing another payment method. By providing this information for credit card transactions, you are consenting to its use in this manner for this purpose. When permitted or required by law, we may share information with additional third parties for purposes including response to legal process. IDL Technologies has implemented numerous security features to prevent the unauthorized release of or access to personal information. For example, all IDL Technologies employees are required to certify their understanding that personal information is considered confidential, that it is important to safeguard personal information, and that IDL Technologies will take appropriate action against any employee who fails to acknowledge these facts or adhere to the requisite standards of conduct. Please be advised, that IDL Technologies is not responsible for the security of information transmitted via the Internet (electronic mail services). However, the Internet is an open system and we cannot and do not guarantee that the individual user information you have transmitted will not be intercepted by others and/or decrypted.

Google Analytics and Advertising:

IDL Technologies uses all features of Google Analytics for Display Advertisers. This includes obtaining specific visitor cookie data, such as the source, medium and keyword used to visit our Web Sites. Google Analytics does not store any visitor-specific data and we will not use visitor-specific data in any way related to Google Analytics, Google AdWords, and Remarketing. IDL Technologies uses remarketing with Google AdWords and analytics to display content-specific advertisements to visitors that have previously visited our site when those visitors go to other websites that have the Google Display Network implemented. IDL Technologies and other third-party vendors, including Google, use first-party cookies (such as the Google Analytics cookie) and third-party cookies (such as the DoubleClick cookie) together to inform, optimize, and serve ads based on visitors’ past visits to our Web Sites. When creating remarketing lists, we cannot and do not use any sensitive information about users, including but not limited to health or medical history or information, financial status or other detailed information pertaining to a person’s finances, racial or ethnic origins, religious beliefs or other beliefs of a similar nature, the commission or alleged commission of any crime, political opinions or beliefs, trade union membership, or sexual behavior or orientation. As Google AdWords advertisers, we are restricted from and will not perform the following actions:

  • Running ads that collect Personally Identifiable Information (PII) including, but not limited to, email addresses, telephone numbers, and credit card numbers
  • Creating a remarketing list or creating ad text that specifically targets users in ways that are outlined as prohibited
You can opt out of Google Analytics for Display Advertisers and opt out of customized Google Display Network ads by visiting the Ads Preferences Manager.


IDL Technologies may consider requests from third parties to contact you, but we will not give that third party any personally identifiable information unless IDL Technologies has obtained your consent. Additionally, IDL Technologies provides you the opportunity to be sent newsletters and information about programming, promotional events, marketing events and opportunities to participate in research studies. You may give this consent by “opting-in” to having your information shared with third parties when you register. Users of the IDL Technologies website are given the opportunity to ‘opt-out’ of receiving communication from IDL Technologies. At any time you may opt-out of any email communications, newsletters, or other electronic communications.

Right to Contact Users:

IDL Technologies reserves the right to contact service visitors regarding sales and other informational requests made through its web service.

Changes to the Privacy Policy:

As a user of the IDL Technologies, please understand that our Privacy Policy may change from time to time. If we decide to make any material changes to our statement, we will post these changes on this web page so users are aware of the type of information we collect, how we use it, and under what circumstances, if any, we disclose it. If, at any point, we decide to use individual user information in a manner different than what was stated at the time it was collected, we will notify users of this change by email. Users will have a choice as to whether or not we use their information in this different manner. IDL Technologies will use information in accordance with the Privacy Policy under which the information was collected.