Cancellation Policy

The Information Technology Act of 2000 (hereinafter referred to as the “Act”), the Information Technology Rules of 2011 (hereinafter referred to as the “IT rules”), the Information Technology (Intel from now guidelines) Rules of 2011 (hereinafter referred to as the “Intermediary Rules”), and any other applicable from now on all complied with in the publication of this privacy statement.. It explicitly stated that the term “Information” should include the information described in clause 2 of this Privacy Policy. Through this Privacy Policy, Company provides information about the details it collects from Partners (including but not limited to personal and sensitive information as described in the IT rules), the reason for such collection, the disclosure of data, and the method of removing or updating Partner Inf.

    • The Company’s business is to market financial goods on its application to Partners so they can market such products to End-Customers. Please refer to the application for further details about the products.
    • The following information is obtained from the Partner by the Company for the following reasons: a. Information obtained and reason for collection
    • The following information is obtained from the Partner by the Company for the following reasons: a. Information obtained and reason for collection
    • Location access is required for the Partner to use the Application.
    • WhatsApp authorisation to send notifications, share leads and product-related information, messages, invite links, etc. Mobile number registered with the UPI payment system for sending payments.
    • Contacts: This feature enables the adviser to add new End-Customers to the Application
    • Aadhar number — required for KYC compliance
    • Bank information needed to send the payment
    • The Paytm mobile number used to send the payment
    • An email address for communication.
    • Bank account information is required to send the payment. Paytm mobile number is also required.
    • An email address for communication.
    • The adviser can use the camera to shoot photographs for the application. The Partner can also post a profile photo using the photo gallery.
    • Educational Certificates – To confirm the Partner’s academic credentials and appoint them as an insurance agent.
    • Point of Sales License (IRDAI): Confirm the POS license holder. Other information related to those above..
    • Before applying for products on the application, end users must first register their details, including their mobile number.
    • PAN numbers are required for KYC compliance and to register end-customer information on the application before they can apply for the products there.
    • Name as it appears on an Aadhaar card is required for KYC compliance and to register end-user information on the application before they may apply for products there.
    • An email address is required for communication to register end-user information on the application before they may apply for the products there.
    • Pin-code – End-customer information must be registered on the application before they may apply for the products there.
      • Reasons for gathering information
      • The general statement of purpose is as follows, even if the specific purposes are stated above:
      • To make the Application usable by the Partner and End User.
      • To make it possible for the Partner to take the money out of the bank.
      • To conduct research and analytics to provide or improve the products/services, their security, and service quality;
      • To facilitate transactions or report on these transactions;
      • To update Partner on any modifications to the products/services and their terms and conditions, including those governing the Application
      • To confirm identity and to give the Partner items.
      • To conduct credit checks, screens, and other due diligence checks as the Company may legitimately request
      • To build and maintain multiple risk management models and financial, regulatory, and management reporting tasks.
      • To adhere to applicable laws, rules, court decisions, or regulatory directions.
      • To enable Partners to register for or set up an account with the Company.
      • The information is gathered to help the company better understand the partners and end users that visit its applications.
    • The data is gathered so that the application’s end users can research and apply for the featured products.
    • The Company does not rent or sell any personally identifiable information about Users to third parties. Only in the ways specified in this Privacy Policy does the Company divulge to third parties personally identifiable information about Users. The company keeps the information in its physical and electronic databases, including those used by its colleagues, employees, auditors, and attorneys (from now on referred to as “Authorised Personnel”). But it is made clear here that:
      • To safeguard the information gathered by the Company and stop illegal access from outside parties, reasonable safety practices are enabled on the Application (and the Company Application is encrypted), the electronic databases, and the physical databases.
      • The Authorised Personnel will only be given access to the data when they genuinely need it, and they will be responsible for keeping it confidential.
      • The information will be used as stated in clause 2 of this privacy statement.
    • Unless the ownership of the Company changes, the Company merges with another company, or the Company forms a joint venture with another party; or the Company is required to do so by law, in connection with any legal proceedings, and to defend our legal rights, the Company will not divulge the personal information of Users to third parties without User consent.
    • The Company does not intentionally collect sensitive personal information from anyone under 18.
    • The Company may post third-party financial products on the Application or utilise third-party advertising businesses to provide adverts to Users who visit the Application. The End-User or Partner may be referred to the third-party website or application when they apply for such products. To show the User advertisements for goods and services they might be interested in, these businesses and third parties may use information about the User’s visit to the Application, including but not limited to the User’s name, address, email address, telephone number, or sensitive personal information. The websites of the advertiser or a third party may also be well aware from this advertising. Users are advised to refer to such websites’ privacy policies and terms of use and exercise reasonable caution and diligence when using such third-party websites. The Company at this moment, expressly clarifies that the company is not making any warranties and shall under no circumstances be responsible for the privacy safeguards of such websites or applications or the accuracy or authenticity of the data contained in such websites or the advertisements. At this moment, it is clear that using the application or visiting the website is contingent upon the user accepting this privacy policy and the terms of use. THE USER IS REQUIRED TO LEAVE/STOP USING THE APPLICATION IMMEDIATELY IF THE USER DISAGREES WITH PROVIDING SUCH ACCEPTANCE. USER ACCEPTANCE OF THE PRIVACY POLICY AND TERMS OF USE SHALL BE DEEMED BY THE USER’S ACT OF USING OR VISITING THE APPLICATION.
    • It is explicit that the user must agree to the terms of use and this privacy policy to use the application or visit the website. IF THE USER DOESN’T WISH TO GIVE SUCH ACCEPTANCE, THE USER MUST IMMEDIATELY LEAVE/STOP USING THE APPLICATION. USER ACT OF USING OR VISITING THE APPLICATION SHALL BE DEEMED TO HAVE ACCEPTED THE PRIVACY POLICY AND TERMS OF USE. • Despite taking the necessary precautions to ensure the security and protection of the Application, the Company shall not be held liable for any security breach or the disclosure of personal data caused by events beyond its reasonable control, such as hacking, social engineering, cyberterrorism, espionage by third parties, or any unavoidable circumstances such as sabotage, fire, flood, explosion, acts of God, civil unrest, strikes or other forms of industrial action, riots, or insurrection.