Data Safety and Privacy Policy

Entity: Rellevv Automation

Contact Email: relievvteam@gmail.com

1. Purpose and Scope

Relievy Automation ('we", 'us", 'our') provides automated data processing tools specifically designed to assist finance teams, audit professionals, and related practitioners in streamlining manual workflows. Our solutions convert PDF documents into well-formatted Excel sheets, merge multiple Excel sheets or workbooks, and perform similar transformations on structured and unstructured financial data.

We recognize that the information processed through our tools often includes highly sensitive financial records-such as bank statements, Form 26AS tax statements, ledgers and other workbooks containing transactional or personally identifiable financial information. This Policy establishes our binding commitment to the complete privacy, confidentiality, and secure deletion of all such data.

This Policy applies to all tools, web applications, and related services offered under the Relievy Automation brand. It governs the collection, use, retention, and deletion of any data uploaded or generated through our services.

2. Definitions For the purposes of this Policy:

Data means any file, document, image, spreadsheet, or other digital content uploaded, submitted, or generated by a User through our tools. This includes, but is not limited to, PDF bank statements, 26AS tax forms, Excel workbooks, CSV files, and any metadata embedded therein.

"Job" means a single processing transaction initiated by a User, consisting of the upload of Data, the automated operation performed by our tool, and the delivery of the processed result.

"User" means any individual or entity that accesses or uses any tool provided by Relievy Automation.

"Temporary Storage" means any volatile or non-volatile storage used solely to facilitate the completion of a Job, from which Data is purged either immediately upon Job completion or within the maximum retention period defined in Section 6.

"Permanent Deletion" means the complete, irreversible removal of Data from all active systems, including all production servers, backup media, caches, and disaster recovery environments, such that no copy remains accessible or restorable.

3. Information We Collect

3.1 Data Uploaded by Users

Users voluntarily upload Data to our tools for the purpose of processing. The categories of Data typically processed include, but are not limited to:

  • Bank account statements (PDF, image, or text formats);
  • Income tax statements (e.g., Form 26AS, TDS certificates);
  • General ledger extracts, trial balances, and journal entries and others GLs;
  • Consolidation workbooks containing multiple sheets;
  • Other financial or audit-related documents.

We do not request, encourage, or require the upload of unnecessary personal information (such as government-issued identifiers beyond what is already contained in financial documents, health data, or biometric information). Users remain solely responsible for the content they choose to upload.

3.2 Information Collected During User Interaction

When Users contact us for technical support, feature requests, or general inquiries, we may collect:

  • Name (optional):
  • Email address:
  • Contents of the communication.

Such information is used exclusively to respond to the inquiry and is never used for marketing, profiling, or shared with third parties.

3.3 Technical Information Automatically Collected

To ensure operational security, diagnose errors, and monitor system performance, we automatically collect certain technical data:

  • Internet Protocol (IP) address;
  • Browser type and version;
  • Operating system;
  • Date and time of access;
  • Pages or tools accessed.

This technical data is aggregated and anonymized where feasible. It is stored separately from Useruploaded Data and retained only as long as necessary for security monitoring and system improvement.

4. Use of Information

4.1 Your Data is used solely and exclusively to perform the specific Job you have requested. This includes:
  • Parsing, converting, or transforming the Data in accordance with the tool's functionality;
  • Temporarily storing the Data for the minimum duration required to complete the Job and deliver results;
  • General ledger extracts, trial balances, and journal entries and others GLs;
  • Consolidation workbooks containing multiple sheets;
  • Other financial or audit-related documents.
4.2 We do not use your Data for any other purpose, including but not limited to:
  • Training, testing, or validating machine learning or artificial intelligence models;
  • Internal research, analytics, or product development unrelated to the immediate Job;
  • Any commercial exploitation.
4.3 We do not sell, rent, license, or otherwise transfer your Data to any third party.

No third party has access to your Data at any time.

5. Legal Basis for Processing

As Relievv Automation operates prior to formal incorporation, we process your Data based on your explicit consent. By uploading Data and initiating a Job, you affirmatively consent to the temporary processing, storage, and deletion practices described in this Policy. You may withdraw your consent at any time by ceasing use of our tools. Withdrawal does not affect the lawfulness of processing based on consent before its withdrawal.

6. Data Retention and Permanent Deletion

We have engineered our infrastructure to minimize the lifespan of your Data. All Data uploaded to our tools is subject to mandatory, automated, and permanent deletion according to the following rules.

6.1 Immediate AutoDelete (Tools with Full Automation)

A subset of our tools is already equipped with instantaneous autodelete functionality. For these tools:

  • Data resides only in volatile memory (RAM) during the active processing window.
  • The instant the processed output is delivered to the User, the Data is permanently erased from all memory and storage media.
  • No copy is ever written to disk, and no backup or residual artifact is created.
6.2 Standard 24–48 Hour Deletion (All Other Tools)

For tools that do not yet support immediate autodelete, the following strict retention policy applies:

  • Data is temporarily stored in secure, accesscontrolled storage.
  • Within 24 to 48 hours after the Job is completed, the Data is automatically and permanently deleted from all systems, including any redundant copies, caches, or temporary directories.
  • This deletion is performed by hardened, automated routines and does not require any manual intervention.
6.3 No Retention Beyond Stated Periods

We do not retain any backup copies of Useruploaded Data. Once the applicable retention window expires, the Data is irrecoverably destroyed. No human operator can restore or access it after deletion.

6.4 Ongoing Enhancement Roadmap

We are actively migrating all remaining tools to the immediate autodelete model. Our goal is to eliminate any persistent storage of User Data, regardless of duration. We anticipate completing this transition within the coming months and will update this Policy as each tool is upgraded.

7. Data Sharing and Third-Party Disclosure

7.1 Our personnel do not access User Data except in the rare event of a critical system failure requiring debugging, and only with your explicit, prior authorization. Any such access is logged, limited to the absolute minimum necessary, and subject to strict confidentiality obligations.

7.2 In the event we receive a legally binding request for disclosure (e.g., a valid subpoena or court order), we will make commercially reasonable efforts to notify you in advance unless prohibited by law. We will challenge any overbroad or unlawful request.

8. Data Security

We employ a defenseindepth approach to protect your Data against unauthorized access, alteration, or destruction. While we continuously strengthen our security posture, we believe in full transparency regarding both current capabilities and areas under active development.

8.1 Current Security Measures
  • Access Controls: Strict rolebased access controls (RBAC) limit system access to a minimal set of authorized personnel. All access is authenticated, authorized, and logged.
  • Physical Security: Our servers are housed in tier3 / tier4 data centers with 24/7 onsite security, biometric access controls, video surveillance, and redundant power/environmental controls.
  • Network Security: Enterprisegrade firewalls, intrusion detection/prevention systems (IDS/IPS), and regular vulnerability assessments are deployed to defend against external threats.
  • Operational Security: All systems are hardened in accordance with industry best practices. Security patches are applied promptly.
8.2 Encryption (In Development)

8.2.1 Current Status Data is not currently encrypted either during transmission (in transit) or while stored (at rest). This is a temporary condition that we are actively remediating.

8.2.2 Planned Implementation We are developing and testing comprehensive encryption protocols, which will include:

  • Encryption in Transit: Full TLS 1.3 (or higher) for all communications between User browsers and our servers.
  • Encryption at Rest: Encryption for all stored Data, with keys managed in a secure, isolated key management infrastructure.

We expect to deploy productionready encryption across all tools in the near future. Upon successful implementation, this Policy will be immediately updated, and all Users will benefit from endtoend encryption.

8.3 User Guidance Pending Encryption

Until encryption is fully deployed, we strongly advise against uploading Data that is subject to heightened regulatory or contractual confidentiality requirements. This includes, but is not limited to:

  • Unredacted bank account numbers;
  • Personal identification numbers (e.g., Social Security numbers, Aadhaar, PAN);
  • Protected health information;
  • Trade secrets or competitively sensitive business strategies.

We are committed to eliminating this limitation as rapidly as possible and will communicate progress transparently.

9. Your Rights and Choices

Even though our automated deletion protocols already ensure that your Data does not persist, you retain the following rights:

  • Right to Confirmation: You may request confirmation of whether any of your Data remains on our systems. We will verify and respond within 72 hours.
  • Right to Erasure: You may request immediate deletion of any Data you believe is still stored. Our standard retention policy already achieves this, but we will honor any expedited request.
  • Right to Withdraw Consent: You may withdraw your consent to processing at any time by discontinuing use of our tools. Any Jobs already in progress will be completed and then deleted per Section 6.
  • Right to Lodge a Complaint: If you believe your privacy has been compromised, you may contact us directly using the information in Section 12. We will check and identify the issue and promptly and provide a substantive response within 7 business days.

To exercise any of these rights, please submit a verifiable request via the contact channels below. We do not charge a fee for such requests unless they are manifestly unfounded or excessive.

11. Changes to This Policy

Relievv Automation reserves the right to update this Data Safety and Privacy Policy from time to time to reflect operational improvements, legal developments, or changes in our processing activities.

Material Changes: If we make a change that materially affects how we handle your Data (e.g., introduction of encryption, change in retention periods, new sharing practices), we will notify Users directly via the email address they have provided.

NonMaterial Changes: Minor clarifications or administrative updates will be posted with an updated effective date and without advance notice.

We encourage you to review this Policy periodically. Your continued use of our tools after any revision constitutes acceptance of the revised terms.

12. Contact Information

Your trust is the foundation of our service. If you have any questions, concerns, or requests regarding this Policy or the handling of your Data, please contact:

Relievv Automation
Email: relievvteam@gmail.com
Response Commitment: We acknowledge all inquiries within 24 hours and strive to resolve them as quickly as possible.

This Data Safety and Privacy Policy represents our honest, current practices and our transparent roadmap toward even stronger privacy protections. We are honored by the trust you place in us and are relentlessly committed to preserving it.