Jump to content

Your Privacy is our Priority


RohitG

Recommended Posts

Truecaller’s mission is to build trust in communicatio­n. Data privacy is one of Truecaller’s highest priorities. Consequently, we have taken the utmost care when designing and implementing our privacy policies. All our users have the power to control and protect how their personal information is displayed to others.

 

 

We ask for permissions only when necessary

The world of communicatio­n is getting more complex day by day. At Truecaller, we are committed to making communicatio­n safer, smarter, and more efficient. We want to ensure you fully understand the permissions we need to make Truecaller function how you want.

You can choose to provide a few optional permissions (such as location, camera, and microphone) depending on the features you intend to use. Also, you can deactivate these permissions in the app or on your device anytime. Read more about this in the permissions section.

We do not sell phone numbers

Building a leading global platform for verifying contacts and blocking unwanted communicatio­ns also means that we are responsible for keeping your data safe. We do not sell our users’ names or phone numbers to third parties. In order to maintain our freemium subscription service, we collaborate with advertising partners but would never sell your personal data.

 

We’re committed to complying with applicable data protection laws

Truecaller is a truly global company and consequently subject to many different data protection regulations in the countries where we are present. We closely track the data privacy regulations to make sure that we proactively adopt good practices and are ready to comply with them. We also allocate significant resources to take the necessary steps to remain compliant.

 

Users can easily exercise their rights and get support


Users can edit their profile in the application at any time, access the personal information associated with their account, rectify it if it is inaccurate or incomplete, or deactivate their account via our Privacy Centre. We have also built a data portability feature that allows users to download a copy of all their information in a readable digital format. We have a dedicated team to address any questions or complaints related to our application or the processing of personal information.

 

Key Product Principles
 

Privacy by Design and Default
We seek implications at an early stage in ideation, and embed privacy into the design and architecture of IT systems and business practices. Privacy is integral to the system and all components of Truecaller are proactive in looking at the privacy implications of any new features.

We seek to deliver the maximum degree of privacy by ensuring that personal data is automaticall­y protected in any given IT system or business practice and that no action is required on the part of the individual to protect their privacy — it is built into the system, by default.

For example, when users register, by default the profile details are private to users who search by name. Users cannot access the phone number by looking up a name unless a user approves this contact request. This enables us to show data in a way that is compliant, ethical, and trusted. It is also easy to un-list if a person does not want their information to be on Truecaller unless identified as a spammer.

 

Data minimization­
We are committed to limiting the collection, storage and usage of personal data to only data that is relevant to carry out the function for which it is processed. Further, we ensure that this necessary and adequate data is collected and processed in the shortest period of time to achieve the desired function.

 

Security and Response

 

Data security
We have stringent measures in place and a strong DNA in the company to do what is best for our users. Truecaller data is safe and has the highest levels of protection. All software developed to operate its core services has been developed in-house primarily using open-source technologies. We protect our assets against unintentiona­l or unauthorized access, alteration, or destruction during storage, transmission, and disseminatio­n. For example,

  • All data we hold is encrypted at rest and we maintain strong encryption methods to avoid and reduce the surface of any attacks.
  • We do not store any credentials and apply a one-time password (OTP) for logging on to our application.
  • We encrypt communicatio­n when transmitting data via Transport Layer Security (TLS).
  • We adhere to industry-leading standards, such as the NIST Cybersecurit­y Framework, ISO-27000 Series, and SANS CIS.

 

Incident response plan
We have adopted a well-established incident response plan, making it clear for all our employees how to recognize and deal with a cybersecurit­y incident like a data breach or cyber-attack. For example, incident management, continuity planning, procurement and development, and external operations and service.

 

Awareness
We make relevant training documents such as the Employee Handbook, Group Data Governance Policy, Data Breach Response Policy, Cyber Security, and Code of Conduct available via the company intranet to ensure that employees have access to such documents in a simple and accessible way. We continuously hold awareness activities across the company to make sure that Truecallers receive continuous training on data protection and security.

Link to comment
Share on other sites
  • Share on WhatsApp

Great. 

  • Like 4
Link to comment
Share on other sites
  • Share on WhatsApp

Hi

  • Thanks 1
Link to comment
Share on other sites
  • Share on WhatsApp

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • Picture this your phone rings, and the person on the other end says they're a family member who’s in trouble. They might say they've been in a car accident or got into trouble and need money urgently. Sometimes, they even say they're your grandchild but the caller is a scammer. Once you send the money, it's gone forever.
      • 6 replies
    • At Truecaller, our mission is to build trust in communication, and part of that mission involves keeping you informed about potential threats. A worrying trend has emerged in Bengaluru, called the FedEX Courier Scam. This is all you need to know.
      • 5 replies
    • Many people receive annoying spam calls on their phones, causing frustration and interruptions in their day-to-day activities, highlighting the need for better ways to stop these unwanted calls.

      Introducing Truecaller's new superhero: 'Max'! 
      Max is Truecaller's latest AI-powered feature that swoops in to save the day from spam calls, even if they're not in the Truecaller database.
       
      How does it work?
      If you get a call from an unknown number, it checks whether it's a spam call or a genuine person is calling. If it's a spam call, it automatically blocks the call
       
      Here's the thing:
      To use the Max feature, you'll need to have Truecaller Premium on an Android phone.

      Excited to partner with Max?
      Just open your Truecaller app, go to 'Settings', tap 'Block', select 'Max' for protection, and you're good to go! Now you can avoid spam calls like a pro.
       
      • 16 replies
    • Recording your phone calls is now seamless using Truecaller's Call Recording feature on Android devices. It's essential to recall every aspect, whether during a business discussion or a personal chat. Call recording enables you to achieve precisely this.
       
      Truecaller's call recording feature is completely safe and secure. After a call is recorded and transferred to your device, Truecaller no longer has access to the recording.
       
      Download Truecaller App  
      Upgrade to the premium version to use the call recording feature.
       
      How does the call recording function work?
       
      1.  Begin the call and hit the recording button.
      2. After the call is answered, there will be a quick 3-second countdown. During this interval, the recipient is placed on hold to initiate the recording process, which begins immediately following this period.

      How to Find and Manage Your Recordings
      All your recorded calls are stored inside the Truecaller app. Once a call concludes or you halt the recording, you have the convenience of accessing, listening to, sharing, renaming, or deleting your recordings straight from the app. Additionally, there's an option to save your recordings to your Google Drive for backup.
       

       
      Enhanced Features for an Improved Experience
       
      Call Recording goes beyond simple recording to elevate your experience:
      - Automatically Generated Call Subject: Simplify the management of your recordings.
      - Instant Conversation Summaries: Get rapid overviews of your discussions for quick memory refresh.
      - AI-Driven Transcriptions: Access written versions of your talks for thorough review.
       
      Benefits of Using Call Recording:
      - Capture Every Detail: Guarantee that key elements of your discussions are recorded.
      - Maintain Attention: Participate in calls without the distraction of taking notes.
      - Prevent Miscommunications: Review calls to clear up any misunderstandings.
       
      Truecaller's Call Recording functionality for Android devices offers a robust solution for improving your call management. Suitable for both business and personal applications, it guarantees that every significant conversation is recorded and preserved. Begin enjoying a more structured and effective communication journey today.
      • 23 replies
×
×
  • Create New...