Agnto Privacy Policy
This Privacy Policy is designed to help you understand how we collect, use, and share personal information and to help you understand and exercise your privacy rights.
Commitment to Privacy
- Fyntune Solutions Pvt. Ltd. is committed to protecting your privacy and safeguarding your data.
- Any information collected will only be used in accordance with this privacy statement.
Policy Updates
- Effective Date: June 1, 2018
- This policy may change from time to time by updating this page.
Information We Collect
- Name, email address, and contact details
- Personal data when you register, make a purchase, or use application features
- Image data (from camera or gallery) for Video KYC/document verification
- Location data for identity verification and application access
How We Use Information
- Provide access to services and features
- Personalize user experience
- Communicate regarding your account or transactions
- Use images for document verification (Video KYC)
- Use location data for security and identity checks
User Rights and Control
- Update or correct account details
- Manage communication preferences
- Request correction or deletion of personal data
- Delete account via app settings or by emailing Support@agnto.com
Data Security Measures
- Strong physical, electronic, and managerial safeguards
- Passwords are one-way encrypted before storage
- 256-bit encryption for communications
- Data hosted with top-tier providers and continuously backed up
- Certified safeguards (technical, legal, and operational)
Disclosure of Information
- May disclose information to government, regulators, or judicial bodies if required by law
- Information not shared with third parties without explicit user consent
Hyperlink Policy
- External links are accessed at user’s own risk
- Fyntune Solutions Pvt. Ltd. is not responsible for external sites’ content or privacy practices
Security Certificates
- Industry-standard certifications and trust verifications in place
- All sensitive communications encrypted and secured
- Regular third-party security audits to ensure compliance
- Continuous monitoring for potential vulnerabilities and threats
- Strict access control and identity verification protocols