Privacy Policy

Privacy Policy for Eviman

At Eviman, accessible from https://privacypolicy.co.in/, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by Eviman and how we use it.

If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us.

This Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in Eviman. This policy is not applicable to any information collected offline or via channels other than this website.

Consent

By using our website, you hereby consent to our Privacy Policy and agree to its terms.

Information we collect

The personal information that you are asked to provide, and the reasons why you are asked to provide it, will be made clear to you at the point we ask you to provide your personal information.

If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide.

When you register for an Account, we may ask for your contact information, including items such as name, company name, address, email address, and telephone number.

How we use your information

We use the information we collect in various ways, including to:

  • Provide, operate, and maintain our website
  • Improve, personalize, and expand our website
  • Understand and analyze how you use our website
  • Develop new products, services, features, and functionality
  • Communicate with you, either directly or through one of our partners, including for customer service, to provide you with updates and other information relating to the website, and for marketing and promotional purposes
  • Send you emails
  • Find and prevent fraud

Log Files

Eviman follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services’ analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users’ movement on the website, and gathering demographic information.

Advertising Partners Privacy Policies

You may consult this list to find the Privacy Policy for each of the advertising partners of Eviman.

Third-party ad servers or ad networks uses technologies like cookies, JavaScript, or Web Beacons that are used in their respective advertisements and links that appear on Eviman, which are sent directly to users’ browser. They automatically receive your IP address when this occurs. These technologies are used to measure the effectiveness of their advertising campaigns and/or to personalize the advertising content that you see on websites that you visit.

Note that Eviman has no access to or control over these cookies that are used by third-party advertisers.

Third Party Privacy Policies

Eviman’s Privacy Policy does not apply to other advertisers or websites. Thus, we are advising you to consult the respective Privacy Policies of these third-party ad servers for more detailed information. It may include their practices and instructions about how to opt-out of certain options.

You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers’ respective websites.

CCPA Privacy Rights (Do Not Sell My Personal Information)

Under the CCPA, among other rights, California consumers have the right to:

Request that a business that collects a consumer’s personal data disclose the categories and specific pieces of personal data that a business has collected about consumers.

Request that a business delete any personal data about the consumer that a business has collected.

Request that a business that sells a consumer’s personal data, not sell the consumer’s personal data.

If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.

GDPR Data Protection Rights

We would like to make sure you are fully aware of all of your data protection rights. Every user is entitled to the following:

The right to access – You have the right to request copies of your personal data. We may charge you a small fee for this service.

The right to rectification – You have the right to request that we correct any information you believe is inaccurate. You also have the right to request that we complete the information you believe is incomplete.

The right to erasure – You have the right to request that we erase your personal data, under certain conditions.

The right to restrict processing – You have the right to request that we restrict the processing of your personal data, under certain conditions.

The right to object to processing – You have the right to object to our processing of your personal data, under certain conditions.

The right to data portability – You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions.

If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.

Children’s Information

Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.

Eviman does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.

Changes to This Privacy Policy

We may update our Privacy Policy from time to time. Thus, we advise you to review this page periodically for any changes. We will notify you of any changes by posting the new Privacy Policy on this page. These changes are effective immediately, after they are posted on this page.

Our Privacy Policy was created with the help of the Privacy Policy Generator.

Permission Policy

At Eviman, we are committed to ensuring the privacy and security safety of our users. This Permission Policy outlines the authorizations requested by our applications and the reasons behind them. We believe in transparency and want you to understand why individual permissions are required when you use our services.

1. Location Permission:

Purpose: 

Some of our services may require credentials to your device’s location to provide you with location-based features such as finding nearby support or services.

Usage: 

Your location data is used only for the purpose of delivering location based services. We do not store or share this information without your explicit permission.

2. Background Location: 

a- In order to show the nearest vehicle on the User app we need the Background Location Permission.
Using this we emit the lat long in every 10 seconds to the API through which we’re able to see the vehicle movement on the Map on the User Side.
b- In order to calculate the accurate travel distance we are sending the lat long in every 500 meter. Through which we are calculating price.
c- We have a functionality to turn the Rider status to online. If the status is Online we are sending the lat lng. If the rider sets the status to offline we stop all the services in the background. So no need to worry about it.
d- As we are getting the nearest rider around you so we need the rider app location in a regular interval in order to get the nearest rider arround you.

3. Camera  Permissions:

Purpose: 

Certain functionalities within our applications may require access to your device’s camera .

Usage: 

Camera  access is utilized solely for features like video calls, audio recording, or augmented reality experiences. We do not access or use these functions without your direct initiation.

4. Storage Permission:

Purpose: 

Our applications may require access to your device’s storage to save and retrieve files, photos, or other data.

Usage: 

Storage access is utilized for tasks like saving downloads, images, or documents generated within the app. We do not access or modify your personal files without your consent.

5. Network Access:

Purpose: 

Network access is essential for our applications to connect to the internet and deliver content.

Usage: 

It enables real-time data synchronization, updates, and the delivery of content from our servers. We do not access your personal network information or use it for any unauthorized purposes.

6. Notifications:

Purpose: 

Our applications may request permission to send push notifications.

Usage: 

Notifications keep you informed about updates, messages, or relevant information related to the application. You can manage notification preferences in the app settings.

Permission Policy Required for

By using our services, you agree to grant these permissions as outlined in this policy. Please note that you have the option to control and manage app permissions within your device settings. We value your privacy and strive to ensure that these permissions are used solely to enhance your user experience and provide you with the best possible service. If you have any questions or concerns about our Permission Policy or privacy practices, please don’t hesitate to contact us.

Data Safety policy

At Eviman, safeguarding your data is our utmost priority. This Data Safety Policy outlines the measures we take to ensure the security, confidentiality, and integrity of your personal information when you interact with our services.

1. Data Encryption:

We employ industry-standard encryption protocols to protect data transmission between your device and our servers. This encryption ensures that your data remains confidential and secure during transmission.

2. Secure Storage:

Your data, including personal information, is stored securely on our servers. Access to this data is restricted to authorized personnel only, and we implement robust security controls to prevent unauthorized access.

3. Regular Security Audits:

We conduct regular security audits and assessments to identify and address potential vulnerabilities in our systems. This proactive approach helps us stay ahead of emerging security threats.

4. User Authentication:

Access to your account and personal data is protected through strong user authentication methods. We encourage users to create strong passwords and enable additional security features such as two-factor authentication (2FA).

5. Data Minimization:

We collect and store only the data necessary to provide our services. Unnecessary data is not retained, reducing the potential impact of data breaches.

6. Data Access Controls:

Our employees have access to your data on a need-to-know basis. Access controls and permissions are enforced to ensure that only authorized personnel can access sensitive information.

7. Data Backups:

We regularly back up your data to prevent data loss due to unforeseen circumstances. These backups are securely stored and can be restored in the event of data loss.

8. Privacy by Design:

We adhere to the principle of “Privacy by Design” when developing and updating our services. Privacy considerations are integrated into every aspect of our product development process.

9. Third-Party Security:

When working with third-party service providers, we ensure they meet stringent security and privacy standards to protect your data.

10. Data Breach Response:

In the event of a data breach, we have established response protocols to promptly identify, contain, and mitigate the impact. We will also notify affected users as required by applicable data protection laws.

11. User Education:

We provide educational resources and guidance to users on best practices for data security, including protecting their accounts and personal information.

Data Safety Policy Require for

By using our services, you acknowledge and consent to the practices outlined in this Data Safety Policy. We are committed to continually improving our data security measures to protect your information effectively. If you have any questions or concerns about our data safety practices, please contact us. Your trust and privacy are of the utmost importance to us.

a- In order to show the nearest vehicle on the User app we need the Background Location Permission.
Using this we emit the lat long in every 10 seconds to the API through which we’re able to see the vehicle movement on the Map on the User Side.

b- In order to calculate the accurate travle distance we are sending the lat long in every 500 meter. Through which we are calculating price.

c- We have a functionality to turn the Rider status to online. If the status is Online we are sending the lat lng. If the rider sets the status to offline we stop all the services in the background. So no need to worry about it.

Contact Us

If you have any questions or suggestions about our Privacy Policy, do not hesitate to contact us.

Scroll to Top