PRIVACY POLICY
This Privacy Policy (the “Policy”) describes our privacy practices concerning information
collected in connection with attendance applications (the “Services”). All the information we
acquire from our clients, end-users is only used to help us with the provision of the Services.
This Privacy Policy is intended to help you comprehend what information we collect from our
clients, end-users and how do we use that information, and when do we use it, in order to
provide our trusted Services. Our role does not just go as far as information collection, we are
also committed to ensuring the security and privacy of the collected data.
DATA ACQUIRED FOR VERIFICATION
The verification process describes what information we collect, how we collect it, and when
we collect it. We require particular information from the end-users or clients. The data
includes, the live images of the attendees.
PERSONALLY IDENTIFIABLE INFORMATION (PII DATA)
PII Data is collected by us which includes the live image, location while marking the
attendance and time stamp. Collection: The live image of the attendee is collected along with
the Geo location while marking the attendance. Use: the live image is used to check the
liveness and perform the face match, in order to check it is a real time process. Disclosure:
The image, coordinates and the attendance marking status will be displayed to attendee after
marking the attendance. Sharing: The status of the attendance shall be shared. Retention of
face data: The face data is collected to perform the liveness and Face match.
VERIFICATION PROCESS
A verification request is Accepted If the end-user passes all of the requirements such as
the liveness, Face-match , location check with Geo coordinates . The app then sends these
results to the client through the API. The results are also available to the client in the back-
office management system, along with complete verification details. The end-user is also
shown the verification status after the process is completed.
A verification request is Declined In cases where the end-user is not verified and the
verification status is Declined, we send these results to the client through the API, as well
as the back-office management system. The results show which checks the end-user
passed and at which check they failed. The verification ends at the failed check. The end-
user is also shown the verification status after the process is completed.
HOW WE SHARE AGGREGATED INFORMATION
From time to time, we may also share anonymized and aggregated information about client
and end-users of the Services (such as by publishing a report on trends in the usage of the
Services).
DATA STORAGE AND RETENTION
The Company acquires but does not stores the information provided by its clients and end-
users for rendering Services. Please see the below outlined terms:
1. Personal data that we process for any purpose or purposes shall not be kept for longer than
is necessary for that purpose or those purposes.
2. We will not retain and delete your personal data after the process as follows:
End-user data category shall be retained or deleted according to the instructions provided
by our client.
Personal data of our clients or their customers (end-users) shared with us shall not be
retained, if any, the data will be deleted from our system.
3. If no instructions are provided by the data controller, we will determine the period of
retention based on the following criteria:
The period of retention of your personal information including any data, images, private
information will be determined based on the applicable data protection laws and the need
for their presence in our system owing to any legal reasons or for the betterment of our
website or services.
4. Notwithstanding the other provisions of this section, we may retain your personal data
where such retention is necessary for compliance with a legal obligation to which we are
subject, or in order to protect your vital interests or the vital interests of another natural
person.
DATA SECURITY
The Company ensures data security through adequate measures to minimize the likelihood
of data breaches, whether pre-emptive or not. Data breaches and protection of data itself
comes under the wider umbrella of the data life cycle. No data is shared with any third parties,
without notifying the client. Additionally, observing the GDPR regulations, secure auditory
practices are carried out to ensure standardized operations and encryption practices.
CHANGES TO OUR PRIVACY POLICY
We may update this Policy from me to me. Any changes will be posted on this page.
COOKIE POLICY
We use first-party cookies to improve the functionality of our Services. These cookies do not
personally identify users but provide insights into how our Services are used.
CONTACT US
If you have any quesons about this Policy, please reach out to us via the email provided on
our applicaon.