Privacy Policy of PharmaNXT App

Below is a summary of what data we gather of yours and how do we handle and safeguard it.

This Privacy Policy describes our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.

We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.

Interpretation and Definitions

Interpretation

The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.

Definitions
For the purposes of this Privacy Policy:

Collecting and Using Your Personal Data

Types of Data Collected

By using the App, you agree to the collection and use of information in accordance with this policy.

1. Read / Write External Storage:

In Read / Write External Storage, the data or information which is being received are saved either on Phone internal storage or SD Card. So, we can fetch data / information for the proper functioning of the application. This permission is only being used by us to cache product image, SMS, profile picture, pictures storage, PDF generation which are being used into the app and that's a part of the application and no personal data like your personal pictures, videos are being affected because of this permission.

Privacy concerns: Despite the name, this permission implicitly enables us to write the data/files into the phone storage either its internal storage or external storage.

2. Access Camera:

We require access to your camera and permissions thereof to ensure that the process of uploading pictures and graphics from your camera on your devices through which you access the Platform is a smooth process and for scanning the QR Code. For instance, you may need to click pictures of your government identity cards for the purposes of KYC obligations.

The Camera permission is required to scan the Barcode for the connection between Marg ERP Software and Marg PharmaNXT App.

3. Internet:

The Internet permission is used to upload and download the data from our internal servers and for the communications with the customers are not being misused or shared with any other party.

Privacy concerns: This permission is the most requested and also the most dangerous, privacy-wise as it enables the communication with remote servers over the Internet. Used in combination with other permissions it allows the application to send any retrieved data to our server.

4. Access Wi-Fi State:

This allows the application to access the information about Wi-Fi networks/Wi-Fi manager. It grants access to the data associated with the Wi-Fi interface i.e. for accessing the data the user has to take the permission.

Privacy concerns: Accessing the Wi-Fi Manager allows the app to read information about the Wi-Fi network the device is connected to, including the current IP address.

5. Bluetooth:

It allows the application to connect to paired Bluetooth devices. We are using this permission to use the functionality of Bluetooth for printer connectivity.

6. Access Location:

These permissions help to understand and track the current location of the user while using the application. The information captured by us is not being shared with any third party. For example we are capturing the location while taking an order or sending a collection report from the application or when user is syncing the products etc.

Privacy concerns: The coarse location is determined by the triangulation of GSM tower cells information and Wi-Fi information or any other strategy/code provided by Google android OS.

7. Record Audio:

Audio Recorder uses your phone’s microphone to record audio. It does not transfer any audio to us or to any third party. It can upload recording files to your account in cloud services if you use any in Premium version.

8. Call Phone:

It allows the application to initiate a phone call without going through the dialer interface for the user to confirm the call being placed.

9. Log Data:

When you access our Service, in case of an error in the app, we collect certain data and information (through third party products) automatically on your phone called Log Data. This Log Data includes information of your device Internet Protocol (“IP”) address, device name, the time and date of your use of the Service, and other statistics.

10. Read Phone State:

It allows read only access to phone state, read the network provider information and these permission is for better access of the application and no personal information or data is being misused by us.

Privacy concerns: This is one of the most controversial permissions. While most applications request this permission in order to detect incoming phone calls which is usually a legitimate use. It can also be used to retrieve sensitive pieces of information such as the phone number.

Any information is not being misused or shared with any other party through this app.

****The information which is being provided by the customer at the time of registration in the applications is kept confidential and is not being shared with anyone.

11. Receive Boot Completed:

Receive Boot Completed permission that allows the application function to be launched when the phone has booted. The notifications which are being received can be read and handled properly.

12. Access /Change Network State:

This allows an application to listen for network observations. Basically, it allows applications to access information about the networks i.e. 2G, 3G, 4G; in order to change the state of the network like 2G or 3G or 4G according to the needs or requirement as per the permission.

13. E-mail:

Any communications with the customers that are through the servers are not being misused or shared with any other party. To contact you, by way of email from time to time to record Your valuable feedback on Our products and Services, as they currently stand, and/or any potential products and services that may be offered in the future.

14. SMS:

To contact You, by way of SMS from time to time to record Your valuable feedback on Our products and Services, as they currently stand, and/or any potential products and services that may be offered in the future.

15. Contacts:

We provide a variety of Services that enable you to effectively manage contact information that you provide to us as part of the Services (your “Contacts”, also referred to as “End User Contact Data” in our Terms of Use.

Contacts typically contain information on individuals (or organizations) including names, email addresses, phone numbers, URLs, social handles, online identifiers, and physical addresses. Your Contacts may also contain additional information on individuals such as organizational affiliations, job titles, birthdays, key dates, age, gender, general location, relationships, skills, interests, preferences, notes, photos, tags and other categorizations.

16. License No:

The Company does not misuse with the license number of the customers.

17. Phone No:

The Company will make all the reasonable efforts in order to ensure that the customer information i.e. phone number is kept confidential but shall not be responsible for any involuntary divulgence or leakage of confidential information of the customer for reasons beyond its control or by action of any third party.

18. Collections:

When we do collections from any party, the application shows the balance due from that particular party. It shows the mode of payment i.e. through Cash, Cheque, Barcode, etc. The process of payment gateway whether through Paytm, Jio Money, etc is very confidential. If the party is paying through cheque then the amount which the party is inserting should be rechecked once before submitting as the company or the application will not be responsible for it.

If the party is paying through cash then there are no chances of mistakes and omissions.

19. Ordering System/Order:

The Company will not be responsible if they have set the limit/condition to the parties for ordering to a particular limit and if the party orders less than the defined limit.

20. Dispatch:

Marg is not responsible for the orders for the pending status and it depends upon the company who is handling it.

21. Help:

Marg will provide the correct information if the party is e-mailing or calling for any clarifications they require/need regarding the PharmaNXT App.

22. You Tube Link / Videos:

Please note that the videos which are being uploaded on our You Tube Page i.e. Marg Tutorial (https://www.youtube.com/margcompusofttutorials) are completely provided for the users to get an understanding about any problem which they faces regarding our software and applications.

23. Security:

The security of your Personal Information is important to us but remember that no method of transmission over the Internet or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

24. Changes To This Privacy Policy :

This Privacy Policy is effective as of (26th August 2022) and will remain in effect except with respect to any changes in its provisions in the future, which will be in effect immediately after being posted on this page.

We reserve the right to update or change our Privacy Policy at any time and you should check this Privacy Policy periodically. Your continued use of the Service after we post any modifications to the Privacy Policy on this page will constitute your acknowledgment of the modifications and you’re Consent to abide and be bound by the modified Privacy Policy

Personal Data

By using the Service, you agree and acknowledge that you are providing all personal information, including sensitive personal data or information to us voluntarily. You hereby consent to our collection, storage, processing, disclosure and transfer to third parties, including our affiliates and other group companies, in any location including outside India of such personal information and including sensitive personal data provided that such third parties ensure that your personal information is protected in compliance with standards that are comparable to the standards of protection afforded to it in India for the Purposes. You may choose to not provide us with your personal information, but in the event that you do so, we will be unable to provide you access to our Service.

While using Our Service, We may ask You to provide Us with certain personally identifiable information that can be used to contact or identify You. Personally identifiable information may include, but is not limited to:

Usage Data

Usage Data is collected automatically when using the Service.

Usage Data may include information such as Your Device's Internet Protocol address (e.g. IP address), Latitude/ Longitude, browser type, browser version, the pages of our Service that You visit, the time and date of Your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

When You access the Service by or through a mobile device, We may collect certain information automatically, including, but not limited to, the type of mobile device You use, Your mobile device unique ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browser You use, unique device identifiers and other diagnostic data.

We may also collect information that Your browser sends whenever You visit our Service or when You access the Service by or through a mobile device.

Tracking Technologies and Cookies

We use Cookies and similar tracking technologies to track the activity on Our Service and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze Our Service. The technologies We use may include:

Cookies can be "Persistent" or "Session" Cookies. Persistent Cookies remain on Your personal computer or mobile device when You go offline, while Session Cookies are deleted as soon as You close Your web browser.

We use both Session and Persistent Cookies for the purposes set out below: