Privacy Policy for HikAll 1.0
Last Updated: February 1, 2025
Thank you for choosing HikAll, developed by WaqWaq.sa. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our HikAll application—a comprehensive solution for managing attendance and access control using Hikvision’s advanced access terminals and IP camera devices. Please read this policy carefully. By using the HikAll app, you agree to the collection and use of your information in accordance with this Privacy Policy.
1. Introduction
HikAll is designed to assist system administrators, security personnel, and authorized users in managing attendance and ensuring secure access control. At WaqWaq.sa, we are committed to protecting your privacy and ensuring that your personal data is handled in a safe and responsible manner. This policy applies to all users of the HikAll app and governs data collection, processing, storage, and sharing practices.
2. Information We Collect
Depending on your interactions with the HikAll app and integrated Hikvision devices, we may collect the following types of information:
A. Personal Information
- User Account Details: Name, email address, phone number, job title, and other contact details when registering.
- Authentication Data: Secure login credentials and authentication information.
B. Operational and Usage Information
- Attendance and Access Data: Includes timestamps, entry/exit records, and user identification data.
- Device Information: Details about devices used to access the app (IP addresses, OS, device identifiers).
- Usage Data: Logs, error reports, and diagnostic information to enhance system performance.
C. Technical Information from Integrated Devices
- Video and Image Data: Captured from Hikvision IP cameras or access terminals for attendance verification and security purposes.
3. How We Use Your Information
- Providing and Maintaining Services: Ensure smooth operation and functionality.
- Security and Access Control: Manage attendance and access events.
- Improvement of Services: Analyze trends, diagnose issues, and enhance user experience.
- Compliance: Adhere to legal and regulatory obligations.
- Customer Support: Address inquiries and support requests.
4. Data Sharing and Disclosure
- Service Providers: Third-party providers assisting in hosting, analytics, and customer support.
- Legal Requirements: Compliance with legal processes or government requests.
- Business Transfers: In case of a merger, acquisition, or asset sale.
5. Data Security
We implement industry-standard security measures to protect your data. However, no internet-based transmission is 100% secure.