At APOGEE GNSS Pvt. Ltd, we esteem your security! We accept that individual data we gather on our administrations (counting our site: and versatile application: TcpGPS for APOGEE or GeoMaster ought to simply be utilized to assist us with giving you the greatest of items, administrations, and backing. This Protection Strategy is expected to make you mindful of APOGEE GNSS PRIVATE LIMITED’s data assortment and use works on, including what data we gather and why we gather it, how we utilize that data, and with whom the data is shared. We might refresh our Security Strategy every once in a while to remain current with changes in our business and to all the more likely serve you. We urge you to peruse this Security Strategy cautiously and to visit this page intermittently for any updates.

The Kinds of Data We Gather.

We gather data from you, straight forwardly, in a roundabout way, and through outsiders, as per this Security Strategy any time you reach us, collaborate with us, or utilize our site, portable application, programming, items, or administrations. On the off chance that you don't give us the data we demand, we will be unable to give our items or administrations to you. The kinds of data we gather are set out underneath.

Data You Give to Us.

To utilize our site, versatile application, programming, items, or administrations, we expect that you give us certain data that may by and by recognize you or your association ("Individual Data"). Assortment of Individual Data can happen, without restriction, in an accompanying way.

- At the point when we speak with you using email. At the point when you make a request or in any case speak with us utilizing email, we will gather Individual Data from you, for example, your email address, telephone numbers, your area, and additionally some other pertinent data we require, and you give. We will hold all email correspondences for an endless period. By speaking with us utilizing email, you agree to our exchange of this Individual Data to our client/accomplice data sets and different storehouses, where found.

- Area data. At the point when you use APOGEE GNSS administrations and programming, we might gather and deal with data about your genuine area. This might incorporate area data given by inward GPS of cell phones and GNSS area data given by any of the gadgets we give.

- Network, Wifi Gadget, and Bluetooth Authorizations. Our administrations will utilize the organization authorization of your gadget to get to the web; Wifi consent (for instance, open WiFi and change Wi-Fi status), and Bluetooth consent of your gadget to open the Bluetooth and get the Bluetooth gadget data that your gadget is bound to.

Data got from your utilization of our administrations, programming, and gadgets.

We might gather non-individual data from you when you utilize our administrations, programming, and gadgets, including the accompanying:

- Gadget data. Explicit gadget data (for instance, the equipment model, the working framework adaptation number, remarkable gadget identifier, and other versatile organization data) will be shipped off to us when you introduce our product and utilize our administration.

- Log data. At the point when you use TcpGPS for APOGEE or GeoMaster administrations, we naturally gather and store specific data in server logs. This data incorporates however isn't restricted to:

  • Device information
  • Detailed operations of our services
  • Detailed operations of our services
  • Crash information

We are using these permissions:-

1. WiFi

Allows Applications to Access Information about Wifi – networks.

2. Location

Allows Applications to Access User Current Location.

3. Manage External Storage

Manage_External_Storage to allow Applications for All Files Access Permissions.

4. Internet

Allows Applications to Open Network Sockets.

5. Bluetooth

Allows Applications to Discover and connect to paired Bluetooth Devices.

6. Storage

Allows Applications to Access the Phone Internal and External Storage.

How Data is Shared.

In the conventional course of business, we won't offer, exchange or lease User data to any outsider untill unless the user express their willingness to do so. We don't impart your Own Data to organizations, associations and people beyond the APOGEE GNSS PRIVATE LIMITED. gathering of organizations other than to our outsider specialist co-ops and accomplices for the reasons set out under the heading "How We Utilize the Data We Gather" above. We might impart non-actually recognizable data to outsiders. For instance, we might share data freely to show patterns about the general utilization of our items, administrations, gadgets and programming.

How We Utilize the Data We Gather.

We utilize the data, including Individual Data, gathered from you for different purposes, including the accompanying:

- To furnish you with admittance to and utilize our site, versatile applications, programming, items or administrations

- To tell you of any progressions to our product, items and administrations and where fitting, to furnish you with any expected updates (counting programming refreshes)

- To give client, specialized and guarantee support

- To identify, forestall and resolve specialized issues related with our product, items and administrations

- To empower us to determine issues to have any gadget or programming code; to improve the exactness of our situating administrations; and to allow our gadgets to speak with other equipment gadgets utilizing network associations, Wifi and Bluetooth

- To break down patterns, survey our presentation and the exhibition of our gadgets, programming, items and administrations

- To screen the utilization of our gadgets, programming, items and administrations

- To work on our tasks and administrations, better comprehend our clients needs and prerequisites and to aid the innovative work of new items and administrations

- To consent to material regulation and to answer legitimately restricting solicitations from lawful and administrative specialists or other outsiders

Maintenance of Individual Data and Utilization Information.

We will hold your Own Data just however long is vital for the reasons set out in this Protection Strategy. We will hold and utilize your Own Data to the degree important to follow our legitimate commitments (for instance, on the off chance that we are expected to hold your information to conform to appropriate regulations), resolve questions and authorize our lawful arrangements and strategies. We will likewise hold your utilization information for inner investigation purposes. Utilization information is for the most part held for a more limited period, with the exception of when this information is utilized to reinforce the security or to work on the usefulness of our items, administrations, gadgets and programming, or we are legitimately committed to hold this information for longer periods.

Revelation of Information.

Under particular conditions, we might be expected to uncover your Own Data whenever expected to do as such by regulation or in light of legitimate solicitations by open specialists (for example a court or an administration office).

We may likewise unveil your Own Data in the entirely honest intentions conviction that such activity is important to:

- To consent to a substantial lawful commitment

- To forestall or examine conceivable bad behavior regarding the utilization of our items, administrations, gadgets and programming

- To safeguard the individual wellbeing of clients of our items, administrations, gadgets and programming or people in general

- To safeguard against lawful risk

Security of Individual Data.

The security of your information is vital to us however recollect that no technique for transmission over the Web or strategy for electronic capacity is 100 percent secure. While we endeavor to utilize monetarily adequate means to safeguard your Own Data, we can't ensure its outright security.

Changes to this Security Strategy.

We might refresh our Security Strategy occasionally. We will tell you of any progressions by posting the new Protection Strategy on this page. You are encouraged to audit this Protection Strategy occasionally for any changes. Changes to this Security Strategy are successful when they are posted on this page.

Instructions to Reach Us.

Assuming you have demands or inquiries regarding this Protection Strategy, you might get in touch with us at