Its really simple to start with automation using Relgo verification Identity Cast.
To generate Identity Cast verify your identity, get your Identity Cast for the device, Identity Cast is the passport for all automation services access.
1 ToGenerate Identity Cast Please Verify your Identity
why Identity Cast?
2 Register to Relgo Network Center with Identity Cast.
3 Create New Relgo Identity
Human Resource Management
Customer Relationship Management
The terms "We" / "Us" / "Our" / ”Company” individually and collectively refer to Relgo Networks Pvt. Ltd. and the terms "You" / "Your" / "Yourself" refer to the users.
To avail certain services on our Websites, users are required to provide certain information for the registration process namely: a) your name, b) email address, c) sex, d) age, e) PIN code, f) credit card or debit card details g) medical records and history h) sexual orientation, i) biometric information, j) password etc., and / or your occupation, interests, and the like. The Information as supplied by the users enables us to improve our sites and provide you the most user-friendly experience.
All required information is service dependent and we may use the above said user information to, maintain, protect, and improve its services (including advertising services) and for developing new services.
Such information will not be considered as sensitive if it is freely available and accessible in the public domain or is furnished under the Right to Information Act, 2005 or any other law for the time being in force.
To improve the responsiveness of the sites for our users, we may use "cookies", or similar electronic tools to collect information to assign each visitor a unique, random number as a User Identification (User ID) to understand the user's individual interests using the Identified Computer. Unless you voluntarily identify yourself (through registration, for example), we will have no way of knowing who you are, even if we assign a cookie to your computer. The only personal information a cookie can contain is information you supply (an example of this is when you ask for our Personalised Horoscope). A cookie cannot read data off your hard drive. Our advertisers may also assign their own cookies to your browser (if you click on their ads), a process that we do not control.
Our web servers automatically collect limited information about your computer's connection to the Internet, including your IP address, when you visit our site. (Your IP address is a number that lets computers attached to the Internet know where to send you data -- such as the web pages you view.) Your IP address does not identify you personally. We use this information to deliver our web pages to you upon request, to tailor our site to the interests of our users, to measure traffic within our site and let advertisers know the geographic locations from where our visitors come.
Our policy discloses the privacy practices for our own web site only. Our site provides links to other websites also that are beyond our control. We shall in no way be responsible in way for your use of such sites.
We shares the sensitive personal information to any third party without obtaining the prior consent of the user in the following limited circumstances
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.
All information gathered on our Website is securely stored within our controlled database. The database is stored on servers secured behind a firewall; access to the servers is password-protected and is strictly limited. However, as effective as our security measures are, no security system is impenetrable. We cannot guarantee the security of our database, nor can we guarantee that information you supply will not be intercepted while being transmitted to us over the Internet. And, of course, any information you include in a posting to the discussion areas is available to anyone with Internet access.
Redressal Mechanism: Any complaints, abuse or concerns with regards to content and or comment or breach of these terms shall be immediately informed to the designated Grievance Officer as mentioned below via in writing or through email signed with the electronic signature to Vasanth Kumar Ravula(CEO).
Services Data is data that resides on Relgo, customer or third-party systems to which Relgo is provided access to perform services (including Cloud environments as well as test, development and production environments that may be accessed to perform Relgo consulting and support services). Relgo treats services data according to the terms of this policy, and treats services data as confidential in accordance with the terms of your order for services.
In contrast, having contracted with Relgo for Cloud or other services, the customer provides Relgo access to its production, development or test environment, which may include personal information about its Employees, Customers, Partners, Suppliers and Endusers.
Below are the conditions under which Relgo may access, collect and/or use services data.
To Provide Services and to Fix Issues. Services data may be accessed and used to perform services under your order for support, consulting, Cloud or other services and to confirm your compliance with the terms of your order. This may include testing and applying new product or system versions, patches, updates and upgrades; monitoring and testing system use and performance; and resolving bugs and other issues you have reported to Relgo. Any copies of services data created for these purposes are only maintained for time periods relevant to those purposes.
As a Result of Legal Requirements. Relgo may be required to retain or provide access to services data to comply with legally mandated reporting, disclosure or other legal process requirements.
Relgo does not use services data except as stated above or in your order. Relgo may process services data, but does not control your collection or use practices for services data. If you provide any services data to Relgo, you are responsible for providing any notices and/or obtaining any consents necessary for Relgo to access, use, retain and transfer services data as specified in this policy and your order.
Relgo's access to services data is based on job role/responsibility. Services data residing in Relgo-hosted systems is controlled via an access control list (ACL) mechanism, as well as the use of an account management framework. You control access to services data by your end users; end users should direct any requests related to their personal information to you.
Relgo is committed to the security of your services data, and has in place physical, administrative and technical measures designed to prevent unauthorized access to that information. Relgo security policies cover the management of security for both its internal operations as well as the services. Relgo's Support, Consulting and Cloud lines of business have developed detailed statements of security practices that apply to many of their service offerings, which are available for review at your request.
Relgo's efforts include making personnel aware of security policies and training employees to implement security policies. Relgo employees are required to maintain the confidentiality of services data. Employees' obligations include written confidentiality agreements, regular training on information protection, and compliance with company policies concerning protection of confidential information.
Relgo promptly evaluates and responds to incidents that create suspicions of unauthorized handling of services data. If Relgo determines that your services data has been misappropriated (including by an Relgo employee) or otherwise wrongly acquired by a third party, Relgo will promptly report such misappropriation or acquisition to you.
Identity Cast is issued after verifying user identity or user personal data based on request. They are used as proof of possessing identity
for services access across automation cloud. You no longer need to enter user name and password, instead just present Identity Cast.
Generated Identity Cast is non portable and holds verification information and are secured for a specific container (Browser) in the device. It can be used
for service access instead of using user name and password or can be presented as identity proof in automated operations.
To Proceed further, Please Register yourself