Cronberry Assist – Android Application

1. What we collect

Cronberry assist app collects call logs information to enable call history feature, when your device is getting incoming/outgoing/missed/rejected call events. Cronberry Assist app stores call informations like phone number, duration of call and time of call. Cronberry Assist mobile application’s collection of information is solely depends on what is pushed to Cronberry server by the user / team member during the official work hours and only when user clicks on IN button available in the application. The business owner can create the official user / team member accounts to be used to login into the application. Only the paid admin accounts can create the logins for their team members.
This includes but not limited to below entities :--

  • User profile including name, email, official phone number and fcm token.
  • In communications submitted to the Website using web forms and the social media/comment features on the Website.
  • When you interact with our advertising and applications on third-party websites and services.
  • Calls records made through official SIM card in between the Check IN and Check OUT time.
  • Call recording if available in between the Check IN and Check OUT time.
  • Lead information updated during work hours.
  • Location tracking for admin usage and conveyance expense calculation.
  • Through mobile and desktop or other applications owned by the Company, including the Cronberry App platform.

2. Why do we collect

  • Name is required for user identity.
  • Email, phone, FCM token are required for createing sms/email or push notifications from cronberry.
  • Location, Call records, Lead records are required for admin / business owner reporting .
  • Rest all entities are required for smart campaign filtering.

3. Data Security

  • We know the importance of your business data privacy and that's why we have designed Cronberry assist application in a way, that each data uploaded is encrypted and securely saved in worlds best secured AWS servers.
  • The user can only login post account creation from admin account. Free or generic login are not allowed
  • Data is only shared with the business owner or designated managers by them and can not be accessed through any other account.
  • Added 256-bit Encryption is done for enhanced security.
  • Data access permission is highly secured by authorized access only.