Company Policies
Cyber Security Policy
General TIPs for Cyber Security
• Always keep your systems/devices (desktop, laptop, mobile) updated with latest patches.
• Protect systems/devices through security software such as anti-virus with the latest version.
• Always download software or applications from known trusted sources only. Never use pirated software on your systems/devices.
• Ensure all devices/accounts are protected by a strong PIN or passcode. Never share your PIN or password with anyone.
• Do not share your net-banking password, One Time Password (OTP), ATM or phone banking PIN, CVV number etc. with any person even if he/she claims to be an employee or a representative of the bank and report such instances to your bank.
• Always change the default admin password on your Wi-Fi router to a strong password known only to you. In addition, always configure your wireless network to use the latest encryption (contact your network service provider, in case of any doubt).
• Be cautions while browsing through a public Wi-Fi and avoid logging in to personal & professional accounts such as e-mail or banking on these networks.
• Always use virtual keyboard to access net-banking facility from public computers; and logout from banking portal/website after completion of online transaction. Also ensure to delete browsing history from web browser (Internet Explorer, Chrome, Firefox etc.) after completion of online banking activity.
• Do scan all e-mail attachments for viruses before opening them. Avoid downloading e-mail attachments received in e-mails from unknown or un-trusted sources.
• Be careful while sharing identity proof documents especially if you cannot verify the authenticity of the company/person with whom you are sharing information.
• Note the IMEI code of your cell phone and keep it in a safe place. The operator can blacklist/ block/trace a phone using the IMEI code, in case the cell phone is stolen.
• Observe your surroundings for skimmers or people observing your PIN before using an ATM.
• Discuss safe internet practices and netiquettes with your friends and family regularly! Motivate them to learn more about cybercrimes and safe cyber practices.
• Do not save your card or bank account details in your e-wallet as it increases the risk of theft or fraudulent transactions in case of a security breach.
• If you think you are compromised, inform authorities immediately.
Specific TIPs for Cyber Security
TIPs for Safe Internet Browsing
• Beware of various fraudulent lucrative advertisements regarding discount coupons, cashback and festival coupons offering payments through UPI apps popping up while browsing.
• Some URL links on the internet are advertising to provide fake apps. Do not download such fake apps on your mobile, as these apps may steal your personal or biometric data from your mobile phone
• Avoid using third-party extensions, plug-ins or add-ons for your web browser as it may track your activity and steal your personal details.
• Always browse/visit the original website for purchasing.
• Always type the information in online forms and not use the auto-fill option on web-browser to fill online forms as these forms may store your personal information such as card number, CVV number, bank account number etc.
• Be careful about the name of a website. A malicious website may look identical to a legitimate one, but the name may use variation in spelling or a different domain (e.g.,[dot]com, [dot]net etc.)
• In general, all the government websites have [dot]gov[dot]in or [dot]nic[dot]in ending.
• Avoid clicking 'Keep me logged in' or 'Remember me' options on websites, especially on public computers.
• Beware of fraudulent charity activities or non-existent charitable organizations having names identical to government charity funds, requesting money for victims, products or research. Always check the credentials of charity organizations before donation.
• Never allow the browser to store your username/password, especially if you use a shared computer device. Also make it a habit of clearing history from the browser after each use session to protect your privacy.
• Be cautious with tiny or shortened URLs (it appears like http://tiny.cc/ba1j5y). Don’t click on it as
it may take you to a malware infected website.
• Prior to registering on a job search portal, check the privacy policy of the website to know the type of information collected from the user and how it will be processed by the website.
• Many social networking sites prompt to download a third-party application that lets you access more pages. Do not download unverified third-party applications without ascertaining its safety.
· Beware of e-commerce websites and advertisements selling items at highly discounted prices.
TIPs for safe Internet Banking
• Always use virtual keyboard for accessing net banking facility and log off from banking portal/website after completion of online transaction. Also ensure deletion of browsing history from web browser (internet explorer, chrome etc.) after completion of online banking activity.
• Use multiple factor authentications for login into your bank accounts.
• Avoid writing down or storing in mobile phones the information used to access digital wallets/bank accounts.
• One should not use the same password for internet banking of all accounts.
• One should not keep the same mobile number registered for all bank accounts.
• Always enable getting notification of transactions from the banks via both SMS & e-mail.
• Login and view your bank account activity regularly to make sure that there are no unapproved transactions. Report discrepancies, if any, to your bank immediately.
• It is preferable to have two separate e-mail accounts, one for communicating with people and another for your financial transactions.
TIPs for E-wallet Security
• Enable password/PIN on your mobile phones, tablets & other devices that you use.
• While doing transactions using your e-wallet, you should never save the details of your debit or credit cards.
• Use multiple factor authentication for logging into your e-wallets.
• Avoid writing down information used to access the digital wallets in mobile phones.
• Install e-wallet accounts from sources you trust. Do not install e-wallet apps via links shared over email, SMS or social media. Always verify and install authentic e-wallet apps directly from the app store (Google/ iOS store) on your smart phone. Please check if the app is having the “Play Protect” shield.
TIPs for E-mail Account Security
• Never keep the same password for all your e-mail accounts.
• Use secure network connections.
• Avoid the use of public Wi-Fi networks. More secure Wi-Fi connections require passwords & are easily identified as “WPA or WPA2”. Highly insecure Wi-Fi is open for anyone to connect to & may be labelled as a “WEP” (Wired Equivalent Privacy).
• Don't click on the links provided in suspicious e-mails even if they look genuine as this may lead you to malicious websites and this may be an attempt to defraud your hard-earned money.
TIPs for Identity Proof’s Security
• Never leave the discarded photo copy of your identity proof at shops.
• Never allow the shopkeeper to keep a copy of your identity proof in their computer.
• Never share your identity proof to unknown persons on social media platforms including WhatsApp.
• Never share your property papers or other personal information on social media platforms.
TIPs for Password Security
• Keep a strong password of at least 8 characters with alphanumeric, special character, upper case & lower-case combination.
• Keep two factor authentication for all your accounts.
• If you suspect that any of your account has been hacked, immediately change the password and contact the nearest Police Station.
Fraud Awareness
Reliable inputs have been received on a new modus operandi of social engineering frauds using mobile numbers resembling a T Wallet toll-free number and registering these mobile numbers in the name of that T Wallet on caller identification mobile apps such as Truecaller. The person (fraudster) attending this call then lures the victim into providing sensitive details such as debit/ credit card credentials, username, OTP, etc. to access the victim’s account and carry out fraudulent transactions.
Human Resource Policy
A Human Resource (HR) Policy is a formal set of guidelines and principles that govern how an organization manages its employees. It ensures consistency, legal compliance, and fairness in all aspects of employment—from hiring to termination.
OUR CORPORATE RESPONSIBILITY:
ShellinfoSG conducts its business in strict compliance with national and international regulations and the highest professional standards. In doing so, we aim to defend and protect the interests and uphold the principles of rigorous corporate governance.
Against this backdrop, Shellinfo places Corporate Responsibility at the Centre of the decision-making process, not only for its management but also for each of its employees in the choices they make in their day-to-day work. This is a necessary commitment in the company's relations with its stakeholders: not only its customers but also its suppliers, shareholders, civil society and, of course, are team members. We have also introduced a proactive environmental policy on activities and products.
Code of Ethics is an integral part of this policy and defines the rules of conduct that everyone in the Group is to apply. The purchasing and corporate responsibility charter involves our suppliers in these commitments. The Ethics and Corporate Responsibility Committee defines the principles behind the policy, while the Ethics and Corporate Responsibility Division ensures that it is put into practice.
TERMS & CONDITIONS OF EMPLOYMENT
Prerequisites of Employment
Employment Application:
All employees will be deemed to have been appointed on the basis of the representation made or facts disclosed in their RESUME and any other documents submitted as an application for appointment. In case any fact or representation is found to be false or inaccurate, it will invalidate the appointment and the Company will be entitled to terminate the employment forthwith.
Residential Address:
You are required to notify the Company immediately upon any changes in your residential address. It will be your responsibility to ensure that the Company's records reflect your current residential address. Any notices provided for hereunder shall be sent to your residential address notified to the Company.
References:
Employment with the Company is subject to receipt of satisfactory references. If any reference is not satisfactory, the Company shall be entitled to terminate your employment with immediate effect. The Company may undertake background verification. If the results of this verification are not satisfactory, the Company shall be entitled to terminate your employment with immediate effect.
The Company is not required to provide you with a reference or a certificate of employment at the termination of your employment. Upon your request, the Company may provide you with a certificate of employment or reference at its absolute discretion. The Company does not accept any liability for any references it may give. Probation Period and Confirmation of Employment. Probation period will be of 3 months' duration. It may be extended by three months. But, in no case will the probation period be extended by more than six months. Upon successful completion of the probation period, the employee will be issued a confirmation letter based on his/ her satisfactory performance during the period of probation.
Trainees will be governed by separate terms and conditions detailed in their contract.
WORKING DAYS: Working Hours and weekly offs
6 days per week, (Monday to Saturday 2nd & 4th Saturdays Holiday) - 9.00 AM till 6.00 PM with 1hr Break (Lunch)
Leave Policy:
Leaves are calculated from January to December of every year.
Casual Leaves - 7 Days in a year (Un-used leaves will not be forwarded to next Year)
Sick Leaves - 6 Days in a year (Un-used leaves will not be forwarded to next Year)
Personal Leaves - 10 Days in a year (Un-used leaves will be accumulated to a maximum of 30 days). More than 30 days accumulated leaves will be lapsed.
Public Holidays -10 Days in a year
Maternity Leave - 3 Months
Paternity Leave - 1 Week
All leaves must be approved 2 days in advance by the Reporting Manager to HR. All medical leaves greater than 2 days must be accompanied along with medical certificate from a medical practitioner.
Employees working extra hours need to be approved by the Reporting Manager, extra every 8 hours worked will be calculated as one-day compensatory leave.
Employees if required to work during public holidays with prior approval from the reporting Manager and shall be compensated as 2 days' compensatory leave. All compensatory leaves must be taken in the same working month.
Late Attendance:
Each employee is responsible to report to work punctually. Persistent late attendance will not be tolerated and will be recorded which may be the ground for initiation of disciplinary proceedings.
For all Employees punching of Bio-Metric is mandatory, Employees who are either late or missed punching for every 3 days in a month coming late will be considered as one-day leave.
Relocation
The following relocation package will be offered to all the Candidates recruited from outside Office location as an additional incentive for all employees. Travel from your place of residence to office location by air/ rail/ road will be borne by the Company within One month of your joining the Company.
Two weeks of accommodation will be provided in a Hotel/ Guest House determined by Shell info. All other expenses will be borne by you.
Company will also reimburse the movement of your personal belongings by road I rail. You will provide three quotations to the Administration Department and one of them will be approved. The expenses must be claimed by you within three months of the date of joining.
Food will be allowed up to a maximum of Rs. 1000 per day and bills to be produced for reimbursement. Normally, breakfast is complementary in the hotel/ guest house.
Laundry bills will be allowed up to a maximum of Rs.500 per week.
STD/ ISO charges on Hotel/ Guest House telephone will be borne by you.
Transportation to and from Hotel/ Guest House to office will be borne by you.
Note# 1: If you leave the Organization within a period of 6 months, you will have to reimburse the entire
relocation claim.
Termination
Termination of Employment by the Company
During the probationary period, your employment may be terminated with One (1) month notice or salary in lieu thereof.
After probationary period, your employment may be terminated by the Company, at its sole discretion, for any reason whatsoever upon the provision of Two (2) months prior written notice or salary in lieu thereof.
However, your employment that may be terminated immediately without any notice in the event of misconduct.
The term "MISCONDUCT" shall have the meaning as provided by law and includes but is not limited to the conduct described in this Manual as misconduct or the definition provided herein. Without prejudice to the generality of the foregoing, "misconduct" shall mean any act or omission which is detrimental to the interests of the business, discipline, reputation or prestige of the Company whether committed within or outside the premises of the Company and whether committed during or after regular office hours. Without prejudice to the general meaning of the term "misconduct" and the meaning under law, it shall be deemed to include the following
Behavior that is disruptive or any willful insubordination or disobedience, whether alone or in combination with others, to any lawful and reasonable order of a superior.
Persistent late attendance at work.
Breach of Company policy on smoking, alcohol and drugs.
Being abusive, rude or exhibiting violent behavior towards clients, customers, fellow employees or management.
Demanding or accepting any bribes, kickbacks, commissions, or any gifts which could be construed as bribes.
Committing any offence within the meaning of the Indian Penal Code.
Damaging Company property or the property of any employee with deliberate intent or tampering with any equipment, articles or any written record, falsifying official records and the like.
Discrimination against any fellow workers or clients or customers on the grounds of sex, race, disability, ethnic origin, caste or any other grounds. You must be aware of the Company's policy on discrimination and harassment.
Theft, embezzlement, fraud, misappropriation or dishonesty in connection with the business or
property of the Company.
Failure to adhere to any statutory or regulatory requirements.
Falsification of any documents irrespective of whether or not it causes the Company loss.
Misuse of your Company vehicle if any.
Negligent behavior which may be gross or which may affect the Company's trust and confidence
in your ability to carry on your job.
Breach of your obligations relating to confidentiality, intellectual property rights, noncompetition and non-solicitation.
Engaging in any occupation, profession, trade, business while in the Company's employment.
Diverting any company opportunities to any other person or entity.
Participating in an illegal or unjustified strike or activities disruptive to the business of the Company, including dharna, gherao, sabotage or any abatement or instigation thereof.
Unauthorized possession of any lethal weapons in the Company's premises.
Making or publishing false, derogatory, defamatory or malicious statements against the Company/management or fellow employees.
Preparing false bills or statement of expenditure.
Acting in any manner prejudicial to the interests of the Company.
Termination of Employment by Employee
You can terminate your employment with Company with prior written notice or salary in lieu thereof for Two (2) months.
During the probationary period, you may terminate your employment with One (1) month notice or salary in lieu thereof.
Clean Desk Policy
Employees are responsible for clearing their desks when they leave the office at the end of the day and employers are responsible for providing access to a paper shredder and storage space. The office manager or the employee's supervisor might be tasked with checking the office at the end of the day and confiscating or destroying any folders, papers or portable storage media an employee might have left out on their desk. Consequences for policy non-compliance could be anything from a verbal warning to a monetary fine, according to the specifications of the policy.
Although a CDP helps protect sensitive corporate and client data assets by limiting exposure to
external parties (such as cleaning staff), it can hamper the work of employees who use visual controls to do their jobs.
Retirement
You shall be liable to retirement at the age of 60 years. The Company may at its discretion grant extension of service beyond the age of retirement/superannuation for such period as it sees fit.
Departure Formalities
Employment and of the restitution of the Employer's property such as access card, cellular phone, laptop, files, records, books etc. No business expenses may be claimed after submission of the Departure Form.
At the time of termination of employment, you will be asked to sign a No Dues form and No Claim Form in the standard format that contains an acknowledgment of the sums received by you on your departure as a full and final settlement of all amounts due to you arising out of your possession.
Exit Policy
In case of resignation, the employees will hand over the hard copy of the resignation letter to the Manager. On accepting the resignation, the Manager will sign the letter and forward it to HR indicating the relieving date. The Manager may also inform the team members and extended staff through email after acceptance.
HR will arrange an exit interview with you and then provides the relevant experience/relieving letter.
After completing the no dues process the HR Department will initiate the Full and Final settlement within 45 days.
Employees ID card deactivation will be initiated by HR Department on the day of relieving.
Conduct and Standard of Behavior at Work
The employees are expected to carry out their duties to the best of their ability and they must follow all lawful and reasonable instructions given to them by the Company. They must keep the Company informed of their conduct in relation to the Company's business and provide explanations for any conduct, as their Reporting Managers considers appropriate.
Non-Smoking Policy
It is the Company policy that smoking will not be allowed inside the Company's premises. Smoking inside the Company's premises is a disciplinary offence and shall be considered misconduct.
Alcohol and Drugs
If you are found consuming alcohol or taking drugs on the Company's premises or are under the influence
of alcohol or drugs in the workplace, then this will be treated as gross misconduct under the Company's disciplinary procedure. The possession of drugs for any reason other than medical is forbidden. You must inform your Reporting Manager if you are taking drugs for medical reasons and in particular if they are likely to affect your ability to work.
You may be required to undergo a medical examination in order to ascertain whether there is a problem in relation to drink or drugs which is affecting your ability to work. You may be suspended from work until the problem has been resolved.
Employees who notice signs of alcohol or drug abuse in a work colleague are expected to report their suspicions and the reason for them to the Managing Director of the Company. This will be treated in total confidence.
Company Property
Employees may not take books, files, stationery, computers, printers, scanners or other Company property away from the workplace. Failure to observe this rule will be treated by the Company as theft of its property. The Company will take appropriate legal steps. The loss, breakage or destruction of any property of the Company caused deliberately or by gross negligence shall be charged against the employee and the amount shall be deducted from the employee's salary.
Clothing and Appearance
The Company expects you, at all times whilst working for the Company, to maintain a well-groomed appearance. In particular:
Hair must be neat and tidy.
Employees are required to wear smart business attire and shoes in accordance with the image that the Company would expect to project. Jeans, leggings, shorts and sport shoes are not advised other than weekend.
Political Activities
It is the Company policy that no active participation in political activities shall not be allowed on the Company's premises.
Acceptance of Gifts: Employees and members of their families may not receive gifts or presentations, whether in the form of Money, Goods, Free Travel or Other benefits from any person or Firm with whom they are, or are likely to be in contact by virtual of their official position or with whom they have had dealings in their official position, except in case of local custom at the time of Diwali, etc., case a gift cannot be refused, it will be handed over to MD and recorded in log.
Environment, Health and Safety
The Company is committed to providing a safe working environment and to care for the health and safety
of its employees. The Company will comply with what is regarded as best practice in relation to the work it carries out.
Employee's Responsibilities - In order to assist the Company in ensuring safety standards are met the employee has a responsibility to ensure that he is aware of the company's environmental policy, As part of this duty the employee should:
Actively cooperate with the Company to ensure that this environmental policy is met by complying with all safety instructions or directions that are issued.
Ensure that any and all equipment or machinery is used in accordance with safety instructions and immediately report any malfunction or other difficulty with machinery or equipment that could be a risk or health hazard.
Report any accidents that occur and cooperate in its investigation.
In Case of Fire: Employee should be aware of nearest fire exits and emergency exits. Also should know about emergency assembly point in case of Fire. Employees should participate in Mock drills conducted. All employees shall know about their respective floor plan.
First Aid: First Aid Kit is available at reception and in any case where employee is not feeling well shall inform and seek first aid.
Equal Opportunities
The Company is an equal opportunities employer and is committed to opposing all forms of discrimination in the workplace. The Company will not tolerate discrimination based upon age, disability, gender, race, religion, ethnic or national origin. The aim of this policy is that all employees know that they are able to work in an environment that is free from discrimination and they are able to achieve their full potential in the job. The Company will make decisions without reference to discriminatory criteria. All employees must be aware of this equal opportunities policy and should abide by its terms at all times.
Sexual Harassment
Shellinfo is an equal opportunity company and is committed to provide a healthy working environment that enables employees to work without the fear of prejudice, gender bias and sexual harassment. The organization also believes that all employees have the right to be treated with dignity. Sexual harassment at the work place or other than work place if involving employees is a grave offence and is therefore punishable.
Sexual Harassment would mean and include any of the following
Unwelcome sexual advances, requests or demand for sexual favors either explicitly or implicitly, in return for employment, promotion, examination or evaluation of a person towards any company activity.
Unwelcome sexual advances involving verbal, non-verbal or physical conduct such as sexually colored remarks, letters, phone calls, email, gestures, showing of pornography, lurid stares, physical contact or molestation, stalking, display of pictures, signs, verbal or non-verbal communication which offends
individual's sensibilities and affect his /her performance
Eve teasing, innuendos and taunts, physical confinement against ones will and likely to intrude upon ones privacy
Act or conduct by a person in authority which creates the environment at workplace hostile or intimidating to a person belonging to the other sex
Conduct of such an act at workplace or outside in relation to an employee of Shellinfo in India or vice versa during the course of employment.
Any unwelcome gesture by an employee having sexual overtones
Redressal: Any employee who feels and is being sexually harassed directly or indirectly must submit complaint of the alleged incident to HR.
HR will initiate the enquiry and provide appropriate disposition.
Information Technology Systems and Tools
You will be provided with IT Infrastructure I.e. Hardware and Software as per your job profile in the organization and budget availability. The recommended Hardware /software shall be compatible to Shellinfo Corporate IT Policy and standard.
Following points are to be considered and pursued by all employees
Employee is not permitted to use the Company's computer for personal use.
Employee is not permitted to make copies of any software or in any way make or distribute copies of software.
All computers should be protected by a password.
Email Guidelines
The Company's email system and computer systems are not meant for personal messages and they should be avoided as far as is possible. The following rules will be applicable to emails sent through the Company's email system or from a computer on Company premises:
The language and content of any messages must be of an appropriate standard and should be succinct and to the point.
Inappropriate language which may include malicious gossip or messages that may amount to a breach of the Company's equal opportunity policies or be otherwise inappropriate will be treated as misconduct. Further, the Company will not tolerate the sending of e-mails that are untrue, obscene or defamatory and any such misuse of its computer systems will be considered misconduct.
Confidential information must not be sent by e-mail.
Email sent through the Company shall remain the property of the Company and the Company shall have the
right to retrieve all e-mails for such reasons as it considers appropriate.
If you receive an email that contains inappropriate matter, you should notify your manager immediately.
Applications/Tools: There are various tools and applications developed internally for business excellence and to facilitate all employees. All employees on board have the responsibility of proper usage of these applications /tools during their tenure of work and shall maintain the confidentiality of the information.
Security Policy:
Shellinfo Security policy is defined in accordance to the corporate security policy and aims to ensure security of persons, sites and information systems.
Protection of Assets and Confidential Documents
The main entrance door and the exit door are constantly monitored by CCTV cameras. You must protect the assets of the Company.
Entry and Exit of employees
Entry and Exit gates of the workplace are controlled. Every entry and exit must be recorded in Biometric device at HR Office.
Employees shall use their access cards for their entry and exits.
Access Photo ID card
Employees are advised to display the Access Card while in Shellinfo facility and challenge person not having their badge displayed. Administration/Security department has to be reported immediately in case of lost or damage card. Therefore, employees are advised to use their access card for entry and exit from the office.
Weekend or Holidays
Shellinfo office facility is open on Weekend. In order to enter the office premise after that or on holidays you need to take prior approval from your Reporting Manager with timely information to Administration/Security department.
Visitor Security
The needs of the business often require the use of vendors, suppliers, contracted security services, alliances, and other outside parties for either a short-time or on an on-going basis to provide various services or highly specialized skills on or off Shellinfo premises. Each site/location will maintain controls necessary to ensure protection of Shellinfo assets and information.
External Visitor:
The Front office will issue a Visitor Badge {without access facility) to the external visitor after recording all relevant information:
No visitor is authorized to enter the office without the visitor pass.
The visitor should not be left alone in the office premises and the concerned employee shall have to accompany the visitor all the time while he/she is in Shellinfo facility.
Entry time and exit time will be monitored.
Note: External people not entering the office and staying at the entrance or at security guard area will not need any pass (Post man, food delivery boy etc.,)
Personal Belongings
The employee should be mindful of protecting the personal belongings. Wallets or pocketbooks should either be carried with you or locked up. Billfolds should not be left in suit jackets in unattended office areas. Money should not be left in desk drawers, even if the desk is locked. Valuable clocks, pen sets, calculators, sweaters or other personal items should be locked up when you leave for the day. The company will not be liable for any such happening.
Information
Shellinfo has a large variety of information assets that contribute to its competitiveness and success as a business. They include extremely valuable proprietary information, such as intellectual property and confidential information. Protecting these assets is critical because loss, theft, or misuse of information may jeopardize the future of Shellinfo. Every Shellinfo employee is responsible for protecting property and information entrusted to them in accordance with Shellinfo policies, instructions, and standards
Critical Communication Facilities
Critical communication facilities are those which, if lost, would cause a significant business interruption at a site/location, and hence should be appropriately secured.
Physical Security
Security Guard - Security support from the professional Security Agency will be there to man the office premises after office hours. The security guard sits outside the main entrance and has given the number of Admin/Security Manager to inform in case of any emergency.
COMPENSATION AND BENEFITS
Compensation
The rate of your salary and perquisites are set forth in your Letter of Appointment/ increment letter.
Salaries are paid monthly at the end of the month by credit transfer to a bank account so that the money will be available in your bank account on or before the fifth (5th) day of each month or on the nearest working day beforehand. You agree that, if for reasons beyond the control of the Company, the payment of salary into your account is delayed; this will not amount to a breach of contract on the part of the Company.
You will receive a monthly itemized salary slip setting out your gross salary, statutory and other deductions and the net sum paid.
Customer Grievance Policy
As a Payment Operator, resolving customer grievances suitably and efficiently is paramount for Shellinfo Global and the object of this policy is to minimize instances of customer complaints through proper review mechanism and service delivery and to ensure prompt redressal of various types of customer complaints.
We as Shellinfo Global understand the importance of customer service which should be prompt and complete in all respects. To achieve this we have taken adequate measures which allow our customers to reach us in multiple ways and we ensure that all customer grievances are recorded and reference number given to the customer for future follow-ups. The internal process in the company takes care of addressing the client request with proper feedback and closing the issue only once confirmed by the client. Internal escalation mechanism exists to automatically forward the issue to next levels based on their importance and time taken to resolve. We ensure the below as part of our internal processes.
Customers are to be treated fairly at all times.
Customers are fully informed of avenues to escalate their complaints/ grievances within the organization and their rights to alternative remedy, if they are not fully satisfied with the response to their complaints.
Complaints made by customers are dealt with promptly and with compassion.
We will treat all complaints efficiently and fairly and the interest of the customer will be presented in good faith and without prejudice.
We understand the frustration our customers feel when something goes wrong. We will look to you to provide all relevant information; including identifying the issue and the solution you are seeking. In turn, we will do our best to resolve your issue quickly, professionally, efficiently and fairly and keep you informed of the progress.
HOW TO REACH US AND REGISTER COMPLAINTS
Our customers can contact our dedicated development center/Customer Service Department (CSD) for any customer queries and to register grievances if any.
A customer has the right to register his/her complaint if he/she is not satisfied with any of the following:
System errors – Causing delay in service.
Unhappy with the quality of Customer Service provided when dealing with staff/CSD
Or any other grievances
The Customer can lodge a complaint in the following three ways:
A customer can contact our Support Team :
+91–40 2208 0331, 24X7 and register their complaints
By writing an email to – admin@shellinfoglobal.com
By visiting the company’s Website:-
https://www.shellinfoglobal.com/contact and lodging your complaint.
Acknowledgment OF GRIEVANCES
SIG’s Grievance Redressal Mechanism (GRM) is simpler without customers facing the hassles of proving identity, account details, etc. Each complaint is assigned and identified by a unique complaint reference number.
Any grievance received through any of the above channels will be routed to our dedicated customer complaint service desk who will immediately record your feedback/grievance.
If the grievance is received through an email or our website, such complaints shall be acknowledged by an immediate system generated response or via individual emails to the extent possible.
The follow-up action taken in respect of such complaints shall be advised to customers by e-mail. The Customer Service Representative (CSR) will also attempt to contact the customer if additional information is required for effective resolution. Our CSR will also advise the defined SLA and keep the customer informed.
Moreover, the customers can track the status of the complaints on the basis of the unique complaint reference number from any location. Standardized rules and regulations with unified service level agreement (SLA) are formed and are applicable to all disputes raised.
If the complaint is not resolved within the given time (SLA) or if he/she is not satisfied with the resolution provided, they can refer to the escalation matrix mentioned below and escalate the issue to the higher authority.
Customer Grievance Escalation Matrix:
At Shellinfo Global, we treat every customer feedback (Compliments and Complaints) with utmost priority and we seek at ways to provide customer satisfaction. We value every feedback as it provides us actionable insights to improve our business, products and service and overall customer experience. We, therefore encourage our customers to provide their feedback and they can record their grievances / provide their feedback in writing or verbally. The customer can approach SIG to register a complaint through any of our service touch points given hereunder and we assure the highest resolution priority to escalated cases.
We have developed an escalation matrix, to handle our customer grievances effectively and efficiently. Instances where a customer does not receive a response within the specified time frame or if the customer is dissatisfied with the response received at the first level, the customer can escalate the complaint to the next level as indicated below. Highest resolution priority is given to escalation cases.
Level 2
Customer can address the grievance to the below address or an email for escalations:-
Shellinfosg Global Digital Technologies Private Limited
2nd Floor, L&T Metro Rail Administrative Building
Uppal Main Road, Nagole
Hyderabad, Telangana - 500039
Email: compliance@shellinfoglobal.com
Level 3
Customer can address the grievance to the below address or an email for escalations:-
Shellinfosg Global Digital Technologies Private Limited
2nd Floor, L&T Metro Rail Administrative Building
Uppal Main Road, Nagole
Hyderabad, Telangana - 500039
Email: compliance@shellinfoglobal.com
Upon receiving the complaint, we will acknowledge within 2 business days.Further response to the escalated issue will be sent within 7 business days post acknowledgement.
Customer Protection Policy
Customer Liability In Case Of Unauthorised Electronic Payment Transactions
1. BACKGROUND:
Shellinfo Global Digital Technologies Private Limited is committed to provide superior and safe customer service experience to all its customers. In order to enable the above, the SIG has invested in technology and has robust security systems and fraud detection and prevention mechanisms in place to ensure safe and secure payment experience to its customers. Keeping in mind the increasing thrust on financial inclusion & customer protection, the Reserve Bank of India had issued a circular on Customer Protection – Limiting Liability of Customers in Unauthorised Electronic Payment Transactions in Prepaid Instruments (PPIs) issued by Authorised Non-banks (RBI/2018-19/101 DPSS.CO.PD.No. 1417/02.14.006/2018-19 dated January 4, 2019) which inter-alia requires PPI to formulate a Board approved policy with regard to customer protection and compensation in case of unauthorized electronic payment transactions.
2.OBJECTIVE :
This policy seeks to communicate in a fair and transparent manner the SIG’s policy on:
Customer protection (including mechanism of creating customer awareness on the risks and responsibilities involved in electronic payment transactions)
Customer liability in cases of unauthorized electronic payment transactions
Customer compensation due to unauthorized electronic payment transactions (reported by customer within defined timelines)
3.SCOPE:
For the purpose of this Policy, electronic payment transactions have been divided into two categories:
Remote / Online payment transactions (transactions that do not require physical PPIs to be presented at the point of transactions e.g. wallets, card not present (CNP) transactions, etc.).
Face-to-face / Proximity payment transactions (transactions which require the physical PPIs such as cards or mobile phones to be present at the point of transactions e.g. transactions at Point of Sale, etc.)
4. Reporting of unauthorised payment transactions by customers to PPI issuer
Shellinfo Global shall ensure that its customers mandatorily register for SMS alerts and wherever available also register for e-mail alerts, for electronic payment transactions.
The SMS alert for any payment transaction in the account shall mandatorily be sent to the customers and e-mail alert may additionally be sent, wherever registered. The transaction alert should have a contact number and / or e-mail id on which a customer can report unauthorised transactions or notify the objection.
Customers shall be advised to notify SIG of any unauthorised electronic payment transaction at the earliest and, shall also be informed that longer the time taken to notify SIG, higher will be the risk of loss to the SIG / customer.
To facilitate this, SIG shall provide customers with 24×7 access via website / SMS / e-mail / a dedicated toll-free helpline for reporting unauthorised transactions that have taken place and / or loss or theft of PPI.
Further, a direct link for lodging of complaints, with specific option to report unauthorised electronic payment transactions shall be provided by SIG on mobile app / home page of its website / any other evolving acceptance mode.
The loss / fraud reporting system so established shall also ensure that immediate response (including auto response) is sent to the customers acknowledging the complaint along with the registered complaint number. The communication systems used by SIG to send alerts and receive their responses thereto shall record time and date of delivery of the message and receipt of customer’s response, if any. This shall be important in determining the extent of a customer’s liability. On receipt of report of an unauthorised payment transaction from the customer, SIG shall take immediate action to prevent further unauthorised payment transactions in the PPI.
5. Limited liability of a customer
A customer’s liability arising out of an unauthorised payment transaction will be limited to:
# The number of days mentioned above shall be counted excluding the date of receiving the communication from the PPI issuer.
**Third Party Breach:
The following would be considered as Third party breach where deficiency lies neither with SIG nor customer but elsewhere in the system:
SIM duplication – Cloning of original SIM to create duplicate SIM
Application frauds
Skimming / cloning
External frauds / compromise of other systems, for e.g. mail servers etc. being compromised
6. Reversal timeline for zero liability / limited liability of a customer :
On being notified by the customer, the SIG shall credit (notional reversal) the amount involved in the unauthorised electronic payment transaction to the customer’s PPI within 10 days from the date of such notification by the customer (without waiting for settlement of insurance claim, if any), even if such reversal breaches the maximum permissible limit applicable to that type / category of PPI. The credit shall be value-dated to be as of the date of the unauthorised transaction.
Burden of proof :
The burden of proving customer liability in case of unauthorised electronic payment transactions shall lie on the PPI issuer.
Reporting and monitoring requirements
The concerned HODs shall ensure that a Report of the customer liability cases to the Board. The reporting shall, inter-alia, include volume / number of cases and the aggregate value involved and distribution across various categories of cases. The Board or one of its Committees shall periodically review the unauthorised electronic payment transactions reported by customers or otherwise, as also the action taken thereon, the functioning of the grievance redressal mechanism and take appropriate measures to improve the systems and procedures.
Other Points :
This policy should be read in conjunction with Customer Grievance Policy of SIG. Clauses from the SIG’s Customer Grievance Policy shall form a part of this policy where not specifically addressed in this policy.
Customer Security Awareness Information
Cyber Safety Tips For Children
Never share your personal details like house address, phone number, date of birth and place of birth etc. on any online platform such as Facebook, Instagram, Blogs, Twitter, Chat-rooms etc.
Make sure that indecent/offending/harassing emails/chats posts are not be responded. Rather keep them in records in the form of screenshots and inform your parent/guardian to report it to the police. The account should be immediately blocked.
When you feel uncomfortable with any SM post/mail/chatting, immediately share your concern with your parents or any trustworthy person.
Never share your account passwords with anyone.
Be aware that information on the internet is not always reliable.
Make a strong password with alpha-numeric symbols and special characters.
Don’t add people as online friends unless you know them in real life or have parent permission.
Never agree to meet an online friend unless and until you are do so under your parent’s/guardian’s guidance and supervision.
Treat others online the way you’d like to be treated yourself. Real life etiquettes and manners apply equally to the virtual space.
Don’t sign up for sites that require a certain age criterion for registration e.g., Facebook, YouTube, Instagram etc. by wrong reporting of your correct age. such sites may expose you to age-inappropriate content.
Don’t buy anything online without discussion with to your parents. Some advertisement may try to trick you by offering things at heavy discount. They may be fraud sites meant for either cheating you of your parents’ money or for getting access to you and your parents’ personal information.
Cyber Safety Tips For Women
Choose a safe online name. Pick a name that doesn’t reflect your complete identity or location.
Have a strong password with alpha-numeric symbol and special characters for your online account.
Secure your computers with anti-virus, anti-spyware and other cyber security tools
Be selective about what information you make public. Be cautious while posting online any information that can personally identify you, a family member, or friend on a public site like a blog, or online white pages, or job hunt sites, or in any other place. Anyone on the Internet can see the information. Sensitive information includes real name, date of birth, gender, town, e-mail address, school name, place of work, and personal photos. Fraudsters, cheats and online perverts can misuse this information to your detriment.
Pay attention to the risks associated with e-mails. and think twice before you open attachments or click links in e-mail-even if you know the sender-as these can be used to transmit spam and viruses to your computer. Never respond to e-mail asking you to provide personal information, especially your account number or password, even if it seems to be from a business you trust. Reputable businesses will not ask you this information in e-mail. Never click on links provided in an email, unless you are sure of the sender and the purpose of email. Instead, use a search engine to find the site. Don’t forward spam, whether it’s a cute ‘thought of the day’, ‘set of jokes’, ‘amazing photo’, ‘recipe tree’ or similar email, if you don’t personally know the sender. The email may be a scam designed to collect the email accounts – and relationships – of everyone you share it with.
Never, try to meet a person with whom you’ve interacted only online without taking somebody else along and such meeting must always be in a public place. Remember, people are not always who they say they are. People often feel uncomfortable setting safety boundaries because they don’t want to offend someone; but good intentioned people will understand and encourage you to set safety requirements, and it is the crooks who want you to feel guilty about it.
Know the Privacy Policy and Terms of Service of any service you use. Create an environment of safety for yourself by understanding how a website that you use, treats your privacy and information. That fine print may tell you the company can own, resell, rent, or give your information to anyone they want. If it does that then find a more respectful site.
Periodically review your internet contacts and online activities. Internet housekeeping is important. Periodically review who you have as contacts, and who can see your online profiles periodically to prune out everyone you no longer have a close interaction with. Review images and content you’ve posted online to see if collectively these tell more about you than what should be known.
Block people you don’t want to interact with. You don’t have to accept invitations to be friends with people just because they ask. People can find it difficult to turn someone down – and creeps and crooks count on this very thing. If you don’t want to be friends, delete the request. If you are already connected with someone you would rather not be, block them from your social sites. You can also block their email account so that they can never contact you through email, and block their phone number from calling or sending text messages to your phone. YOU get to choose who, how, and when you are contacted.
Note that if you become a victim of a cyber-crime, it is not your fault. If you fall victim to a scam, fraudster, abuser or criminal, don’t blame yourself. The only person guilty is the abuser or a criminal. You didn’t cheat, scam, lie, threaten, harm, steal, or abuse yourself in some other ways, so don’t lay a burden of guilt. Don’t let the abuser or the criminal shame you into silence. Speak out and get the help you need.
Be extremely cautious while posting photographs and control who can view them. Bear in mind that photos can be saved and altered – you don’t want to regret having posted a particular photo, at a later stage! Create restricted user groups who can view photos. Also, don’t post embarrassing pictures of others.
Use strong passwords and use different passwords for different accounts. Social networking sites are very easily hacked into and information can be modified. So, ensure that you don’t use weak passwords with personal information such as your birthday or your dog’s name. Your password should be one that is difficult to guess.
Don’t share your password with anyone or let anybody else handle your account. What is seen as trust or some harmless fun, can have severe consequences.
Don’t accept “friend requests” from people totally unknown to you and from those that you don’t want to interact with. If you are being bothered by someone already on your friend’s list, feel free to block them! You get to choose who you want to interact with; don’t be “nice” and put up with any inconvenience.
Ensure your computer has a good antivirus and anti-spyware software. A lot of applications on social networking sites can be malicious, and if your computer is not well protected, it can result in a lot of issues.
Last, but not the least, trust your instinct. If you are being subjected to any form of cyber bullying or harassment, report it at once!
Remember that information that you post once on the internet cannot be erased. Use your common sense and utmost caution when you publish anything. A lot of cybercrimes can be prevented simply by exercising caution.
If you notice any offensive, abusive or illegal online post/content, immediately take its screenshot. Also take a screenshot of the link/URL Of the illegal content.
On social media make friends with people whom you personally know. Many times, we accept friend requests from friends of friends. However, even your friends may not be knowing them and had accepted their friend request because it was a friend of friend. Such unrecognizable friend may be cheats and perverts who may misuse your ‘friend’ privileges and access on social media to harm you in many ways.
Don’t click on links sent over Facebook Messenger or other messages services, even if they are sent from your friend’s account, if they are unsolicited (i.e., you have neither asked for it nor were you expecting it). Note: even your friend’s account may have been hacked and used from hackers to spread malware to unsuspecting ‘friend’.
Don’t share any OTP or other passwords, even with ‘friend’ on any pretext. Such ‘pretext’ are tricks used by hackers to deceive you through social engineering in sharing your passwords, which may have grave consequences, such as loss of control over Social Media account, your email account ID, etc.
On social Media accounts keep your privacy settings to the most stringent levels. Only share information about yourself on ‘Need to Know’ basis.
On WhatsApp and other messaging Apps, ensure that ‘media auto-download’ is deactivated, esp. from senders who are not in your contact list. Such media (videos, photos, documents, etc.) may have malwares embedded in them.
Always keep your devise (Phone, Tablet, Laptop etc.) in safe custody. Keep your lock screen on with Password/Pin protection. Don’t keep your device unattended even for a minute.
Note: Information posted online can never be completely removed. So, apply caution while sharing anything online.
Note: The online audience is much larger than we comprehend. Anything offensive or embarrassing, has a higher chance of become viral and out of control. Apply caution while posting things other people.
Cyber Safety Tips For Senior Citizen
Make sure your computer has security software on it and also check that the auto-update feature is enabled to ensure that your computer has the latest security features.
Passwords need to be unique and strong – these passwords need to be made up of upper- and lower-case letters as well as numbers. Never reveal your password to anyone. Passwords are an excellent guarantee of safety and security online.
Post with caution on social networking sites. It is a good idea to also understand how privacy settings work on social networks.
Don’t automatically install a software because it is free – these types of software are generally riddled with spyware which can slow or crash your computer.
Attachments can contain a virus and the virus can be transmitted to your computer as soon as you open the attachment. Be wary of suspect attachments, even from people you may know. If an email or attachment seems suspicious, don’t open it. Online criminals often use e-mails to get personal information from you in order to steal your identity. Sometimes these emails will invite you to click a link which downloads malware to your computer.
Although online banking is very convenient for seniors, be sure to only enter information into security-enabled sites. Sites for instance which begin with https:// means that the data is encrypted in transit. Look out for this and don’t enter any bank details or credit card information into websites that start only with http://
Emotional abuse is as rife online as it is elsewhere. It is best not to satisfy the abuser with any kind of response.
Never trust a link sent to you by someone you don’t know. By clicking the link, you may be taken to a site that may look like your bank or credit card company, but it is not. One thing a criminal can’t fake is the actual website address of a company or bank. Instead of clicking a link in an e-mail, search for the Web address using a search engine such as google to find the real one. Ask the company about the message you received, or call using the number listed on your statements. Mark the real site as a favourite in your browser so that one click brings you there safely every time.
Never trust an e-mail that asks for your personal or account information (called a phishing scam). These usually seem convincing (the shabby ones have spelling errors, but the high-quality scams look impeccable). No bank or reputable company is going to send you an e-mail asking you to correct your information, validate your identity, re-enter your password, and so on.
The smarter scams often contain text, warning you against fraud. They do this because many people believe that an e-mail that warns them to be careful must be legitimate. That is not always true. This also extends to sites that claim they have protections in place for your privacy and security. Anybody can make these claims, but only certain sites protect you.
Never respond – or even open an e-mail with a deal that is too good to be true unless it is from a company that you know well and expect to get these kinds of offers from them. Scammers want you to react without taking time to think through, so their e-mails frequently sound urgent, such as:
“If we don’t hear by tomorrow your account will be closed” (and you’ll notice that the date of “tomorrow” never is listed).
” This offer won’t last, order now to ensure”
Never believe that someone you don’t know is going to give you money.
Do not believe a person from another country who just needs you to “help transfer funds” and they need your bank account number to do so. Such scammers promise to give you a huge amount of money for helping them out. The result is an empty bank account.
If you never entered a lottery, you can’t win the lottery. Such scams ask you to provide your information and bank account number so they can transfer your prize money. Don’t, the result will be an empty bank account.
Don’t believe a really rich, famous person just wants to help you out… and that the celebrity also mysteriously needs your address, phone number, bank account information to do so. The result will be an empty bank account.
Are you a senior citizen who is active on social media? Have you off late become friends with individuals from other countries (whom you don’t know in real life) and these online friends have been really caring and emotionally supportive. Have you ever wondered how these online oversees ‘friends’ have suddenly come into your life and become your emotional support? Well, many a time, these ‘friends’ are fraudsters who are spinning on elaborate web of deceit around you. They will, on some pretext or the other, trick you and emotionally blackmail you to share your hard-earned retirement money with them. Don’t fall for such elaborate frauds. Apply the real-world caution that you have learned over the years to virtual space too.
Don’t fall prey to fraud calls regarding Insurance Bonus, New policy with better coverage, etc. where the returns/gains offered are much higher than industry norm. These fraud callers have an eye on your retirement funds and induce you by promising exceptional returns.
Cyber Safety Tips For Parents
Have an open conversation with your kids about safe browsing and computer use.
Do not replace physical parental supervision of computer use at home with any safe search engine or any other tool. No search filtering software or tool is perfect.
Educate yourself also on social media safety and have open discussions with teens about present dangers and long-term effects of inappropriate conduct, including posting pictures/videos online.
Keep computer in an open area. Make a rule that doors are always left open when kids are online.
Advice your children to immediately exit any site that makes them feel uncomfortable or worried.
Parent should keep a track of persons with whom their children are talking to and which sites they are browsing. This is NOT invading their privacy at all, rather it is parenting in the digital space.
If you have found inappropriate content about your child, please contact the service provider concerned and/or Police as soon as possible.
Majority of children would not like to tell their parents if they are bullied or harassed online for fear that they will lose internet access. Make sure that your children understand that they will not get in trouble if they tell you about a problem.
Children under 13 ARE NOT ALLOWED on Facebook, Instagram, Snap Chat, iTunes and many more. Don’t support your child to break the rules as they are not be the only one without these accounts.
Explain it to your child that all Social Networking Profiles MUST BE SET TO PRIVATE. Use all the security settings available to make the site as safe as possible.
Do not let young children to browse the ‘Google’ aimlessly with no supervision. Children need to be taught about search engines and how they work.
Don’t allow your child to use Apps like Snap Chat that immediately delete the posts. Apps prevent you from monitoring the child’s online experience and you may never know what he is being subjected to
If you notice a sudden change in your child’s behaviour, to check, among other things, his online activity on Facebook, WhatsApp etc.
Cyber Safety Tips For Business Persons
Defend your computers. Keep all software (including your Web browser) with automatic updates and install all security updates that your IT department recommends. Use antivirus, antispam, and antispyware software and activate your firewall.
Think before you share sensitive information. Look for signs that a Web page is safe, before you enter sensitive personal or business data–a Web address with https (“s” for secure) and a closed padlock () beside it. Never give sensitive info in response to an e-mail or instant message (IM) request.
Think before you click. Pause before you open attachments or click links in e-mail or IM even if you know the sender; they could be phony. Confirm with the sender that the message is real or visit the official Web site by typing the address yourself. Be wary of clicking links or buttons in pop-up windows.
Use strong passwords. Lock your online accounts, computer, phone, and other devices with passwords of at least eight characters length (longer is better), and include upper- and lower-case letters, numbers, and symbols. Keep passwords and PINs secret. Don’t disclose them to co-workers or businesses (like an Internet café operator), or be tricked into giving them away. Don’t use the same password everywhere.
Protect yourself from e-mail scams. Look out for alarmist messages, misspellings and grammatical errors, deals that sound too good to be true, requests for sensitive information like account numbers, and other signs of a scam. Turn on a filter that warns you of suspicious Web sites.
Protect your data on the go. When you use public Wi-Fi, choose the most secure option, even if you have to pay for it. It could include password-protection and encryption. Confirm the exact spelling of the wireless network you’re connecting to. Beware of clever (slightly misspelled) fakes. Encrypt the data on your laptop (or USB flash drive) in case you lose it or it’s stolen. Guard your laptop, smartphone, and PDA as carefully as your wallet.
Restricting the types of websites that employees are allowed to visit can help you exclude the sites that could compromise your network.
Advise employees about which software are safe to be installed on their computer.
When someone outside of your business requests any personal or business information, verify that he is a safe person with whom information can be sent.
Write an Internet Usage Policy for personnel to follow and post it in an accessible place for all to see and refer to.
Set rules on what kinds of business information your employees can share online, and where.
Create instructions on whether your employees should use their working email to sign up for social media sites and newsletters.
Consider the implementation of a company social media policy, so that employees know what they should and should not post online.
Update all of your business software when you receive notifications to do so, so that all security fixes are up to date.
Instruct all of your employees to have complex passwords that have letters, numbers and symbols so they are harder for cyber criminals to steal/crack.
Always be suspicious of phone calls, emails or other communications from an unknown source.
Only visit legitimate and trusted websites while using business computers or working with business information.
Before providing personal information to anyone, verify that they are a trusted source (for example, a bank would not send out personal inquiries by email, so a call to the actual bank might be advised if such an email were received).
If someone is seeking your personal information, ask why the information is required.
If the answer does not seem satisfactory, do not provide it — or ask for their supervisor to get more details.
Never remove or disable any security safeguards put into place on business networks and computers (such as anti-virus software).
Social networking sites like Facebook, Twitter and LinkedIn can be powerful tools for your business to reach potential customers and build stronger relationships with clients. However, social networking sites and services are becoming an increasingly popular way for cyber criminals to try to get your personal or business information to hack into your personal or business computer systems.
If your business uses social networking sites for marketing or professional purposes, you will need to choose one or more employees, and only allow them to post content in your business’s name.
Social Media Safety Tips
Use caution when you click links that you receive in messages from your friends on social website. Treat links in messages on these sites as you would treat links in e-mail messages.
Always remember what you’ve posted about yourself. A common way that hackers break into financial or other accounts is by clicking the “Forgot your password?” link on the account login page. To break into your account, they search for the answers to your security questions, such as your birthday, hometown, high school class, father’s middle name, on your social networking site. If the site allows, make up your own password questions, and don’t draw them from material anyone could find with a quick search.
Don’t trust that a message is really from one who has been shown there. Hackers can break into accounts and send messages that looks like they’re from your friends, but they aren’t. If you suspect that a message is fraudulent, use an alternate method to contact your friend to find out its veracity. This includes invitations to join new social networks.
To avoid fetching of e-mail addresses of your friends, do not allow social networking services to scan your e-mail address book. When you join a new social network, you might receive an offer to enter your e-mail address and password to find out if your contacts are on the network. The site might use this information to send e-mail messages to everyone in your contact list or even to everyone you’ve ever sent an e-mail message with that e-mail address. Social networking sites should explain that they’re going to do this, but some do not.
Type the address of your social networking site directly into your browser or use your personal bookmarks. If you click a link to your site through e-mail or another website, you might be entering your account name and password into a fake site where your personal information could be stolen.
Be selective about one whom you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you.
Choose your social network carefully. Evaluate the site that you plan to use and make sure that you understand the privacy policy. Find out if the site monitors content that people post. You will be providing personal information to this website, so carefully examine that the site where you are going to provide details of your credit card.
Assume that everything you put on a social networking site is permanent. Even if you delete your account, anyone on the Internet can easily print photos or text or save images or screenshots or videos in his device.
Be careful about installing extras on your site. Many social networking sites allow you to download third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information. To download and use third-party applications safely, take the same safety precautions that you take with any other program or file, you download from the Web.
Think twice before you use social networking sites at work.
Talk to your kids about social networking & brief them about DO’s & Don’ts.
Social Media Precautions For Business Persons
Social networking should be addressed in your business’s Internet Usage Policy with clear advice to employees. Here are some social networking issues that you should consider:
Be clear on what information about your business can be posted and who is authorized to do so.
Refrain from including sensitive business information in the business profile or in your posts.
Be careful using applications on social networking sites. Many of these come from third parties and may not be secure. Always check on the application provider first.
When communicating through social media, be suspicious of any messages that are asking for sensitive business information or about employees and their families.
Think before you post! What you post on social media sites is generally permanent. You may someday change your mind about what you said online, but you can’t remove or change it permanently as it might have been save as screenshots by someone.
Criminals are interested in the information you post. To help your business stay safe, make sure you use the site’s privacy controls and ignore requests from people you don’t know.
Review and stay up to date with the social networking site’s privacy policies (most are updated frequently) and adjust personal privacy settings appropriately.
Never reveal your precise location online.
Cyber Safety Tips For Net Banking Users
Password protect the mobile phone having your banking application. It is recommended to set the maximum number of incorrect password submissions no more than three.
Choose a strong password to keep your account and data safe
Review your account statements frequently to check for any unauthorized transactions
Change your password regularly
Report a lost or stolen phone immediately to your service provider and law enforcement authorities
Never give your PIN or confidential information over the phone or internet. Never share these details with anyone
Don’t click on links embedded in emails/social networking sites claiming to be from the bank or representing the bank
Don’t transfer funds without due validation of the recipient, as funds once transferred cannot be reversed
Don’t store sensitive information such as credit card details, mobile banking password and user ID in a separate folder on your phone
Don’t forget to inform the bank of changes in your mobile number to ensure that SMS notifications are not sent to someone else
Never reveal or write down PINs or retain any email or paper communication from the bank with regard to the PIN or password
Be cautious while accepting offers such as caller tunes or dialler tunes or open/download emails or attachments from known or unknown sources
Be cautious while using Bluetooth in public places as someone may access your confidential data/information
Be careful about the websites you are browsing, if it does not look authentic, do not download anything from it
Data Privacy Policy
This Data Privacy Notice is applicable to personal information and sensitive personal data or information, including information that is of a confidential nature (“Customer Information”) belonging to the customers, potential customers, and other users of the Services (“Customer(s)” of Shellinfo Global Digital Technologies Private Limited.
Shellinfo Global Digital Technologies Private Limited is strongly committed to protecting the privacy of its Customers and has taken all necessary and reasonable measures to protect the confidentiality of the Customer Information and its transmission.
If you are not a Shellinfo Global Digital Technologies Private Limited client and are accessing our website to learn more about our company and the products and services we offer, please be assured that we will also protect the confidentiality of any personal information we may acquire about you. However, we may disclose personal information to our affiliates, third party service providers or as otherwise required or permitted by law.
Customer Information includes, without limitation, the following categories of personal data that we may collect, receive, possess, store, use, deal, handle, transfer, and otherwise process as per applicable laws:
Data about you: This may include, without limitation, your name, user IDs, signature, email addresses, phone numbers, Phone Contactlist Information, addresses, KYC/identity documents, biometric data, communications with us, device and location data, information about how you use our Services, etc.
Financial data:
This includes, without limitation, information about your wallet account details, financial information, transaction data etc.,
Marketing and communications data: This includes, without limitation, your preferences relating to receiving marketing messages from us and our service providers, and your communication preferences.
You should ensure that all Customer Information that you provide us with is accurate, up-to-date, and true. You will be responsible for any errors, discrepancies, or inaccuracies in the Customer Information you share with us, except for such Customer Information that has been verified through KYC processes set out by applicable law and backed by documentary proof.
We may collect a few information from our Website, the information you enter into our Website when you request information from us on Website and tracking information that tells us how you use our Website. Any information you enter into our website will be treated as personal information. Personal information may include your name, address, telephone number and e-mail address.
Please note that the Information you provide to us when filling out forms or requests for information on our websites, as well as information we supply when you are visiting those areas, is protected while passing through the Internet using encryption technology. Although we will use all reasonable efforts to safeguard the confidentiality of your information, Internet transmissions cannot be made absolutely secure. We will not be liable for the unintended disclosure of information due to errors in transmission or unauthorized acts of or breaches of security by third parties.
Shellinfo Global Digital Technologies Private Limited endeavours to safeguard and ensure the security of the Customer Information using appropriate measures to protect it from unauthorised access, and follow standards prescribed by applicable law. Shellinfo Global Digital Technologies Private Limited uses appropriately secure encryption for the transmission of Customer Information.
The Customer is required to cooperate with Shellinfo Global Digital Technologies Private Limited in order to ensure the security of the Customer Information, and it is recommended that the Customer necessarily chooses their passwords carefully such that no unauthorised access is made by a third party. The Customer should not disclose their password to anyone or keep any written or other record of the password such that a third party could access it.
By using the Shellinfo Global Digital Technologies Private Limited On-line Services, you accord your acceptance of this Privacy Policy.
This Privacy Policy is supplemented by Privacy Notices addressed to our specific relationships with you, including Privacy Notices that are sent to individuals as required under applicable laws and regulations.
We may occasionally update this Privacy Notice. By using our Services after such update, you consent to updates made to this Privacy Notice. We encourage you to periodically review this Privacy Notice for the latest information on our privacy practices. When we make changes to our Privacy Policy, we publish a revised Privacy Policy describing the change. Similarly all changes will also be described on our websites.
We understand that you may have questions about this Privacy Notice, on how we process or handle your Customer Information, or may otherwise want to understand these aspects. We welcome you to reach out to us with your queries, grievances, feedback, and comments or contact our grievance officer, whose details are provided below:
Email: compliance@shellinfoglobal.com