1. GENERAL INFORMATION
2. COLLECTION AND USE OF INFORMATION
a) Device ID is used to identify mobile device.
b) Location data is used to recognize access control readers in the vicinity of the mobile device.
c) A camera is used to add mobile identifiers using QR codes and to load data for parameterizing the operation of Roger Mobile Key.
Data obtained from a mobile device is not collected and is only used for the purpose of user identification.
3. EVENTS AND ANALYTICS
By making a decision to use the application, you agree to the use of analytical technologies provided by the manufacturer of operating system. If an error occurs while working with the application, error reports can be created and saved in the device's event log. Such reports may include for example device model, operating system version, time and date, etc. Such data is collected solely for the purpose of developing and improving the application.
Only secure and encrypted data transmission methods are used to ensure the security of transmitted data. However, it should be noted that no method of data transfer is 100% secure and reliable, and there is always risk related to breaching cyber security.
ROGER sp. z o.o. sp. k.
Copyright © 2008-2023 Roger All rights reserved