Privacy-policy

Plennery, operated by Auxilix Technologies Private Limited (“we,” “our,” or “us”), is committed to protecting the privacy and security of our clients, partners, customers and their data. This comprehensive privacy policy explains in detail how we collect, use, process, and safeguard your information when you use our healthcare SaaS platform. This policy applies to all services provided through the Plennery platform, including web applications, mobile applications, APIs, and related tools designed for healthcare operations management.

Information We Collect

Institution Information

Basic Institutional Details
  1. -Legal business name and registration information
  2. – Physical address and location data
  3. – Contact information for authorized representatives
  4. – Healthcare facility type and specialization details
Operational and Administrative Data
  1. – Staff scheduling and roster information
  2. – Department structure and hierarchy details
  3. – Resource allocation patterns – Billing and financial management data
  4. – Compliance documentation and certifications
Resource Management Information
  1. – Asset tracking and management data
  2. – Inventory levels and procurement patterns
  3. – Staff qualification and certification records
  4. – Resource utilization metrics
  5. – Maintenance schedules and records
Workflow Information
  1. – Standard operating procedures
  2. – Clinical and administrative process flows
  3. – Communication patterns and protocols
  4. – Task assignment and completion data
  5. – Quality control measures and outcomes

Usage Information

Platform Interaction Data
  1. – User login and authentication records
  2. – Feature usage patterns and preferences
  3. – Session duration and frequency
  4. – User role assignments and permissions
  5. – Customization settings and preferences
  6. – Interface language and regional settings
Technical Information
  1. – Device information and identifiers
  2. – IP addresses and network data
  3. – Browser type and version
  4. – Operating system details
  5. – API usage patterns
  6. – Error logs and debugging data
Analytics Data
  1. – Operational efficiency metrics
  2. – Resource utilization trends
  3. – Workflow optimization data
  4. – Cost reduction measurements
  5. – Performance benchmark comparisons
  6. – Quality improvement indicators

How We Use Your Information

Core Platform Operations
  1. – Providing and maintaining the Plennery platform
  2. – Processing and completing requested operations
  3. – Authenticating users and maintaining security
  4. – Managing user accounts and preferences
  5. – Facilitating communication within the platform
  6. – Generating operational reports and analytics
Platform Optimization
  1. – Analyzing usage patterns for feature improvement
  2. – Identifying and resolving technical issues
  3. – Optimizing system performance
  4. – Enhancing user interface and experience
  5. – Developing new features and capabilities
  6. – Conducting quality assurance and testing

Business Intelligence

  1. – Generating anonymized industry benchmarks
  2. – Creating aggregate performance metrics
  3. – Analyzing healthcare operation trends
  4. – Developing industry insights
  5. – Measuring platform effectiveness
  6. – Identifying optimization opportunities
Compliance and Security
  1. – Maintaining audit trails
  2. – Ensuring regulatory compliance
  3. – Detecting and preventing fraud
  4. – Managing security protocols
  5. – Responding to security incidents
  6. – Conducting security assessments
Compliance and Security
  1. – Maintaining audit trails
  2. – Ensuring regulatory compliance
  3. – Detecting and preventing fraud
  4. – Managing security protocols
  5. – Responding to security incidents
  6. – Conducting security assessments

Data Security

Technical Security Measures
  1. – End-to-end encryption for data transmission (TLS 1.3)
  2. – AES-256 encryption for data at rest
  3. – Multi-factor authentication implementation
  4. – Regular security patches and updates
  5. – Intrusion detection and prevention systems
  6. – Regular vulnerability assessments
  7. – Automated threat monitoring
  8. – Secure backup systems
Administrative Security Controls
  1. – Role-based access control (RBAC)
  2. – Regular security training for staff
  3. – Documented security procedures
  4. – Incident response protocols
  5. – Change management processes
  6. – Access review procedures
  7. – Security compliance audits
  8. – Vendor security assessments
Physical Security
  1. – Secure data center facilities
  2. – Environmental controls
  3. – Physical access restrictions
  4. – Surveillance systems
  5. – Disaster recovery capabilities
  6. – Business continuity planning
  7. – Hardware security measures

Data Sharing and Disclosure

Authorized Sharing
We may share your information with:
  1. – Third-party service providers under strict confidentiality agreements
  2. – Regulatory authorities as required by law
  3. – Auditors for compliance verification
  4. – Emergency services when necessary
  5. – Legal authorities with valid orders
Data Processing Agreements
All third-party service providers must:
  1. – Sign comprehensive data processing agreements
  2. – Maintain specified security standards
  3. – Process data only as instructed – Ensure staff confidentiality
  4. – Implement required security measures
  5. – Report any security incidents
  6. – Allow security audits
International Data Transfers
For international data transfers, we ensure:
  1. – Compliance with cross
  2. -border data regulations
  3. – Appropriate data transfer mechanisms
  4. – Required security measures
  5. – Data protection agreements
  6. – Regular compliance monitoring

Data Retention

Retention Periods
  1. – Active subscription data: Duration of subscription plus 30 days
  2. – Compliance data: As required by applicable regulations
  3. – Audit logs: Minimum 7 years
  4. – Security incident data: 5 years – Backup data: 90 days rolling retention
  5. – Analytics data: 3 years in identifiable form
Data Archival
  1. – Secure archival systems
  2. – Limited access controls
  3. – Regular integrity checks
  4. – Encryption requirements
  5. – Retrieval procedures
  6. – Destruction protocols
Data Archival
  1. – Secure archival systems
  2. – Limited access controls
  3. – Regular integrity checks
  4. – Encryption requirements
  5. – Retrieval procedures
  6. – Destruction protocols

Your Rights and Data Deletion

Data Subject Rights
You have the right to:
  1. – Access your personal data
  2. – Correct inaccurate data
  3. – Request data portability
  4. – Restrict processing
  5. – Object to processing
  6. – Withdraw consent
  7. – Request data deletion

Detailed Data Deletion Process

Initiating Deletion
Submit requests through:
  1. – Account settings (Data Management section)
  2. – Email to privacy@plennery.com
  3. – Written request to our registered office
  4. – Authorized representative contact
Verification Process
We verify requests through:
  1. – Account authentication
  2. – Official documentation
  3. – Security questions

Plennery Privacy Policy Disclaimer

General Disclaimer
This Privacy Policy Disclaimer (“Disclaimer”) is an integral part of the Plennery Privacy Policy. By accessing or using Plennery’s services, you acknowledge that you have read, understood, and agree to be bound by both this Disclaimer and the Privacy Policy.
No Guarantee of Security
While Plennery implements robust security measures and industry-standard protocols to protect your data, we cannot guarantee absolute security of information transmitted through the internet or stored electronically. Despite our best efforts and comprehensive security measures, no data transmission or storage system can be guaranteed to be 100% secure.

Third-Party Risks

External Links and Services
Plennery may contain links to or integrate with third-party services. We are not responsible for the privacy practices, content, or security of these external sites or services. Users access third-party services at their own risk.
Third-Party Service Providers
While we carefully select and monitor our service providers, we cannot be held responsible for any breach, data loss, or security incident that occurs at the third-party level, provided we have exercised reasonable due diligence in their selection and oversight.

User Responsibilities

Account Security
Users are responsible for:
  1. – Maintaining the confidentiality of their login credentials
  2. – Ensuring secure access to their accounts
  3. – Implementing appropriate internal security protocols
  4. – Promptly reporting any security concerns or suspicious activities
  5. – Training their staff on security best practices
Data Accuracy
Users are responsible for:
  1. – Providing accurate and up-to-date information
  2. – Regularly reviewing and updating their information
  3. – Ensuring the accuracy of data they input into the system
  4. – Verifying the completeness of their data

Limitation of Liability

Direct Damages
Plennery’s liability for any direct damages arising from privacy or data security incidents shall be limited to the extent permitted by applicable law and shall not exceed the fees paid by the user in the twelve (12) months preceding the incident.
Indirect Damages
Plennery shall not be liable for any indirect, incidental, special, exemplary, or consequential damages, including but not limited to:
  1. – Loss of profits – Loss of data
  2. – Business interruption
  3. – Reputational damage
  4. – Cost of substitute services

Force Majeure

Plennery’s liability for any direct damages arising from privacy or data security incidents shall be limited to the extent permitted by applicable law and shall not exceed the fees paid by the user in the twelve (12) months preceding the incident.
Indirect Damages
Plennery shall not be liable for any failure to perform its obligations under the Privacy Policy where such failure results from circumstances beyond its reasonable control, including but not limited to:
  1. – Natural disasters
  2. – Government actions
  3. – Civil unrest
  4. – Cyber attacks
  5. – Technical failures
  6. – Pandemic
  7. -related disruptions

Compliance Disclaimer

Regulatory Changes
While we strive to maintain compliance with applicable laws and regulations, we cannot guarantee immediate compliance with new or modified regulations as they come into effect. Users are encouraged to independently verify their compliance obligations.
Regional Variations
Privacy and data protection laws vary by jurisdiction. Users are responsible for ensuring their use of Plennery complies with their local laws and regulations.

Modification Rights

Policy Changes
Plennery reserves the right to:
  1. – Modify this Disclaimer at any time
  2. – Update the Privacy Policy as needed
  3. – Change security measures and protocols
  4. – Adjust data handling practices
  5. – Revise user rights and responsibilities
Service Modifications
We reserve the right to:
  1. – Modify or discontinue services
  2. – Change security features
  3. – Update technical requirements
  4. – Adjust service levels
  5. – Implement new protection measures
Indemnification
Users agree to indemnify and hold Plennery harmless from any claims, losses, or damages arising from:
  1. – Their violation of the Privacy Policy
  2. – Unauthorized use of the platform
  3. – Breach of this Disclaimer
  4. – Non-compliance with applicable laws
  5. – Misuse of services
Severability
If any provision of this Disclaimer is found to be unenforceable or invalid:
  1. – The provision shall be modified to the minimum extent necessary
  2. – Remaining provisions shall continue in full effect
  3. – The overall intent of the Disclaimer shall be preserved
  4. – Users will be notified of material changes
Governing Law
This Disclaimer shall be governed by and interpreted under Indian law, without applying conflict of law principles.
Acknowledgment
By using Plennery’s services, users acknowledge that:
  1. – They have read and understood this Disclaimer
  2. – They accept the stated limitations and responsibilities
  3. – They agree to comply with all applicable terms
  4. – They assume the risks inherent in using digital services
  5. – They will maintain appropriate security measures
Contact Information
For questions regarding this Disclaimer, contact:
  1. – Legal Department: legal@plennery.com
  2. – Privacy Team: privacy@plennery.com
  3. – General Inquiries: info@plennery.com

See Plennery in Action

Discover how Plennery transforms healthcare workforce management with real-time scheduling, compliance automation, and seamless payroll.

What You'll Learn in the Demo Video:

  • How to automate shift scheduling and avoid last-minute staffing issues.
  • How Plennery tracks compliance and alerts you about expiring credentials.
  • How payroll processing becomes effortless with integrated tracking.
Avatar

Your Reliable Partner in Workforce Management

With automation, real-time oversight, and seamless workflows, Plennery makes workforce management more predictable, efficient, and reliable.

See Plennery in Action

Discover how Plennery transforms healthcare workforce management with real-time scheduling, compliance automation, and seamless payroll.

What You'll Learn in the Demo Video:

  • How to automate shift scheduling and avoid last-minute staffing issues.
  • How Plennery tracks compliance and alerts you about expiring credentials.
  • How payroll processing becomes effortless with integrated tracking.