PRIVACY POLICY

Welcome to Echko by Evara INC. Your privacy is of paramount importance to us. This Privacy Policy outlines how we collect, use, and safeguard your information when you use our services. Please take the time to read this policy carefully to understand our practices regarding your personal data and how we protect your privacy.

Important Notice: Echko and this Privacy Policy are intended exclusively for users residing in India. If you are located outside India, you are not authorized to use our services under the protections and terms of this Privacy Policy. If you choose to access or use Echko from outside India, you do so at your own risk, and you acknowledge that you will not be considered a party to this Privacy Policy. By accessing or using Echko within India, you agree to the collection and use of your information as described in this Privacy Policy. If you do not agree with the terms outlined herein, or if you are located outside of India and do not wish to assume the associated risks, please refrain from using our services.

We are committed to transparency, and if you have any questions or concerns, feel free to contact us at echkohelpline@gmail.com or contact us at +91 7888037767.

I. User Onboarding Process for Echko

Echko offers two convenient methods for users to create and authenticate their accounts: OTP Authentication and Gmail Authentication. Each method is designed to provide a seamless onboarding experience while ensuring the security and accuracy of user data.

1. OTP Authentication

In the OTP Authentication method, users begin the onboarding process by entering their phone number into the app. Once the phone number is submitted, Echko will send a One-Time Password (OTP) to the provided number via SMS.

Steps for OTP Authentication:

  • Step 1: User inputs their phone number in the designated field.

  • Step 2: Echko sends a unique OTP to the user's phone number.

  • Step 3: User enters the received OTP into the app for verification.

  • Step 4: Upon successful verification of the OTP, the user is logged into the app and proceeds to complete their profile setup.

After successful login, users will need to manually fill in additional personal information to complete their profile. The fields that require manual input include:

  • Date of Birth (DOB): Users are prompted to enter their date of birth to ensure compliance with age-related requirements and for personalized features.

  • First Name and Last Name: Users input their first and last name, which will be displayed within the app and to other users in their circles.

  • Profile Picture: Users can upload a profile picture from their device to personalize their account.

This method provides users with full control over the information they share and allows them to update or change any of these fields during the setup process.

2. Gmail Authentication

The Gmail Authentication method allows users to create an account and log in using their existing Gmail credentials. This method simplifies the onboarding process by automatically importing key personal information from the user’s Gmail account.

Steps for Gmail Authentication:

  • Step 1: User selects the option to log in with Gmail.

  • Step 2: The user is redirected to the Google sign-in page, where they enter their Gmail credentials.

  • Step 3: Upon successful authentication, Echko automatically retrieves and updates the user’s profile with the following data fields from their Gmail account:

    • Date of Birth (DOB): Imported from the user's Google account settings.

    • First Name and Last Name: Retrieved from the user’s Google account and used to auto-populate the corresponding fields in Echko.

    • Profile Picture: The user’s Google profile picture is automatically set as the Echko profile picture.

  • Step 4: The user is logged into the app with their profile already populated with the imported information.

This method streamlines the registration process by reducing the need for manual data entry, allowing users to get started with Echko more quickly and with less effort. Additionally, the Gmail Authentication ensures that the user’s profile is consistent with their existing Google account, maintaining a uniform digital identity across platforms.

II. Age Verification and User Accountability

Echko collects and verifies the age of its users through two different authentication methods: OTP Authentication and Gmail Authentication. The accuracy of the age data provided is critical for several features within the app, including the appropriate distribution of content via the newsletter and ensuring that necessary parental consent is obtained for younger users.

III. INFORMATION WE COLLECT

A. Information You Give Us Directly

  • Account Information: When you create an account, we collect information such as your name, email address, phone number, password, and any such other information that we would require to identify and authenticate your account, facilitate communication, enhance account security, and provide personalized services.

  • Profile Information: You may provide additional information to complete your profile, such as a profile picture, address, and emergency contact details.

  • Communication Data: We collect information when you communicate with us or other users through the App, including messages, feedback, and customer support inquiries.

B. Information We Collect When You Use or Interact with Our Products and Services

  • Location Data: We collect precise geolocation data from your device to provide location-based services. This includes your real-time location and location history.

  • Usage Data: We collect information about your interactions with the App, such as features used, pages viewed, and actions taken.

  • Device Information: We collect information about the devices you use to access our services, including IP address, device type, operating system, and unique device identifiers.

  • Emergency Contacts: We collect the contact information of emergency contacts as provided by users. This information is essential for notifying designated individuals in case of an emergency.

  • Safe Spaces: We collect data about safe spaces as provided by users. This information helps us identify and display secure locations for users in need.

  • Other Data: Any other such data not defined in the above points that we collect while you use or interact with our products and services.

C. Information Provided to Us by Third Parties

  • Social Media Integration: If you choose to connect your account with social media platforms, we may receive information from those services, such as your public profile, friend list, and shared content.

  • Third-Party Services: We may receive information from third-party services that you use to interact with our App, such as authentication providers or payment processors.

IV. HOW WE COLLECT INFORMATION

A. Cookies and Similar Technologies

  • Cookies: We may use cookies to remember your preferences, improve your user experience, and gather usage data. Cookies are small text files stored on your device.

  • Web Beacons: We may use web beacons (also known as pixel tags) to collect information about your interactions with emails and web pages, helping us understand engagement and effectiveness.

B. Analytics and Advertising Technologies

  • Analytics Tools: We may use third-party analytics tools, such as Google Analytics, to collect information about your usage of the App. This helps us understand user behavior and improve our services.

  • Advertising Technologies: We may use advertising technologies, such as ad networks and cookies, to deliver relevant ads to you based on your interests and usage patterns.

V. HOW WE USE YOUR INFORMATION

A. Administrative Purposes

  • Account Management: We use your information to create and manage your account, provide customer support, and communicate with you about your account.

  • Service Provision: We use your information to provide and improve our services, including location sharing, SOS alerts, and other features.

B. Marketing Products and Services

  • Promotional Communications: With your consent, we may use your information to send you promotional materials, offers, and updates about our products and services.

  • Targeted Advertising: We may use your information to deliver personalized ads based on your interests and interactions with the App.

C. Research and Development

  • Service Improvement: We use your information to analyze user behavior, conduct research, and develop new features and services to enhance your experience.

  • Feedback and Surveys: We may use your feedback and survey responses to understand user needs and improve our offerings.

D. Information Collected Automatically Through the Use of Tracking Technology

  • Usage Patterns: Any technologies that we deploy to collect information about your usage patterns, which helps us optimize our services and improve user experience.

VI. INFORMATION WE DISCLOSE TO THIRD PARTIES

A. Disclosing to Members in Your Circles

  • Location Sharing: We share your location and relevant information with members of your circles within the App to provide location-based services.

B. Information Posted to Our Blogs, Community Forums, or Other Public Websites

C. Service Providers, Business Partners, and Advisors

  • Third-Party Services: We may share your information with trusted third parties who provide services on our behalf, such as hosting, analytics, customer support, and payment processing.

  • Business Partners: We may share your information with business partners to offer integrated or co-branded services.

D. Purchasers and Other Third Parties in Connection with a Business Transaction

  • Business Transfers: In the event of a merger, acquisition, or sale of our assets, your information may be transferred to the new owner or entity.

E. Law Enforcement, Regulators, and Other Parties for Legal Reasons

  • Legal Compliance: We may disclose your information if required by law, regulation, or legal process, or if we believe it is necessary to protect our rights, safety, or property.

  • Legal Liability: Our security system is fully compliant with all applicable laws and regulations. We have taken all necessary and sufficient steps to protect your data. Therefore, in the event of a breach or infiltration of our systems that leads to harm to your data, we will not be liable.

F. De-Identified Information

  • Aggregate Data: We may share aggregated or de-identified information that cannot be used to identify you with third parties for various purposes, including research and analysis

VII. YOUR CHOICES ABOUT YOUR INFORMATION

A. Modifying, Correcting, Reviewing, and Deleting Your Information

  • Account Settings: You can access, update, and delete your personal information by logging into your account and managing your settings.

  • Data Requests: You may request access to, correction of, or deletion of your personal information by contacting us at echkohelpline@gmail.com.

B. Communications from Us

  • Opt-Out: You can opt out of receiving promotional emails and communications from us by following the instructions in those messages. You will continue to receive non-promotional communications, such as account updates.

C. Location and Movement Data Collection and Sharing

  • Location Settings: You can control the collection and sharing of your location data through your circle settings, device settings, and the App's settings. The application gives you an option to turn-off your location for groups individually, meaning that you can turn off your location for only those groups in which you do not want to share it.

VIII. OUR POLICY TOWARDS CHILDREN

A. Eligibility and Age Requirement
Users must be at least 13 years old to create an account on Echko. Therefore, users do not fall under the category of "children" as defined by applicable laws that typically require parental consent and supervision for those under the age of 13. Since our app is intended for users who are 13 years old or older, parental consent and supervision are not required for account creation or usage.

B. Compliance with Legal Standards
We adhere to legal standards that protect the privacy and safety of minors. Our policy ensures that individuals below the age of 13 are not permitted to use Echko, thereby aligning with regulations that require parental consent and oversight for users under 13.

IX. HOW WE PROTECT YOUR INFORMATION

A. Security

  • Security Measures: We implement appropriate security measures to protect your information from unauthorized access, disclosure, alteration, or destruction. This includes encryption, access controls, and regular security assessments.

Echko is committed to ensuring the security and protection of your personal information. All security measures implemented by Echko are in full compliance with the relevant Indian laws and statutes, including but not limited to:

  • The Information Technology Act, 2000, and its amendments

  • The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011

  • The Indian Penal Code, 1860, as applicable to cybercrimes

  • The Payment and Settlement Systems Act, 2007, as applicable to electronic payments and data security

  • Any additional regulations, guidelines, or directives issued by the Reserve Bank of India (RBI) concerning data protection and security in financial transactions

Echko adheres to these laws and guidelines to ensure the confidentiality, integrity, and security of your personal and sensitive personal data. We employ industry-standard encryption, access controls, and regular security audits to protect against unauthorized access, disclosure, alteration, or destruction of your information.

B. Accuracy and Confidentiality of Your Email Address and Password

  • Account Security: You are responsible for maintaining the confidentiality of your account credentials and for any activity that occurs under your account. Notify us immediately of any unauthorized use of your account.

C. Device Security

  • Device Protection: We recommend that you use appropriate security measures on your devices, such as passwords, encryption, and antivirus software, to protect your information.

D. Fraud Prevention

  • Fraud Detection: We use various methods to detect and prevent fraudulent activity, including monitoring account activity and investigating suspicious behavior.

E. Onward Transfer

  • Third-Party Agreements: We ensure that any third parties receiving your information agree to protect it and use it solely for authorized purposes. These third parties must comply with all relevant legal standards as well as our stringent privacy and security requirements.

F. Data Retention

  • Retention Policy: We retain your information only as long as necessary to provide our services and as required by law. We regularly review and delete or anonymize data that is no longer needed.

X. Emergency Message Content Restrictions

As part of Echko’s commitment to user safety and regulatory compliance, the emergency message content utilized within the Echko app is strictly controlled. These messages are pre-approved and registered with the Distributed Ledger Technology (DLT) portal, which is a regulatory requirement designed to ensure the authenticity and reliability of emergency communications.

A. Purpose of Emergency Message Content Restrictions

The primary objective of these restrictions is to maintain the integrity and consistency of emergency communications sent via the Echko app. By using pre-approved content, Echko ensures that all emergency messages conform to established standards that have been verified and accepted by relevant regulatory authorities. This approach is critical to prevent misinformation, reduce confusion during emergency situations, and ensure that all users receive clear and accurate guidance.

B. In-App Editing Restrictions

Due to these regulatory constraints, Echko users do not have the capability to edit or alter the emergency message content within the app. This restriction applies to all users, regardless of their subscription level or app usage. Any attempt to modify the emergency message content is automatically disabled to comply with regulatory guidelines and to uphold the safety protocols established by Echko.

C. Compliance with Regulatory Standards

Echko’s adherence to the Distributed Ledger Technology (DLT) regulations reflects our commitment to operating within legal frameworks designed to protect users. These regulations are in place to ensure that emergency messages are traceable, verifiable, and secure, thereby providing users with the confidence that the information they receive is both credible and reliable. By complying with these standards, Echko contributes to a safer and more trustworthy communication environment.

XI. LINKS TO OTHER WEBSITES AND SERVICES

  • Third-Party Links: Our App may contain links to other websites and services. We are not responsible for the privacy practices or content of these third-party sites. We encourage you to read the privacy policies of those sites.

XII. CHANGES TO THIS PRIVACY POLICY

  • Policy Updates: We may update this Privacy Policy and our Terms and Conditions from time to time. Any changes will be posted on the app, and we advise you to review these policies periodically for any updates. In an event wherein we make a significant change/changes, we will provide a more prominent notice and will mandatorily seek your consent before implementing the revised changes in the privacy policy.

Amendments and Notifications:

Echko reserves the right to amend or update the Privacy Policy at any time to reflect changes in our practices, services, or legal obligations. Any such amendments will be communicated to you in accordance with applicable Indian laws, including but not limited to the Information Technology Act, 2000, and related regulations.

We will notify you of any significant changes through the app, via email, or by other appropriate means, as required by Indian law. Upon receiving such a notification, you will be given the option to review the updated terms. If you do not agree to the amended Terms and Conditions or Privacy Policy, you may withdraw your consent and discontinue the use of our services by closing your account. Continued use of the app after the amendments have been communicated will be considered as acceptance of the revised terms.

XIII. CONTACT US IF YOU HAVE QUESTIONS OR CONCERNS

A. Authorized Agents

  • Agent Requests: You may designate an authorized agent to make a request on your behalf. We will verify the identity of the agent and the authorization before processing the request.

B. Right to Contact a Data Protection Authority

  • Data Protection Authority: If you have any concerns about our privacy practices, you have the right to contact your local data protection authority. Contact information for data protection authorities can be found on their respective websites.

Acknowledgment and Consent

By accessing or using our app, you hereby acknowledge that you have read, understood, and agree to be bound by these Terms and Conditions and our Privacy Policy. This agreement constitutes a legally binding contract between you and Echko, governing your use of the app and any services provided therein.

You can reach out to us anytime by mailing us at echkohelpline@gmail.com.