Step 1: Candidate and Session Information
Basic Candidate Information
During the session, the following basic details are processed:- Name and email ID used to access the assessment
Step 2: Identity Verification Information
Photo Capture
To verify your identity, the system collects:- A live photo of the candidate
- Images captured during onboarding
Photo ID Information
For identity verification, the following ID-related information is collected:- Country and state selected by the candidate
- Type of ID provided
- Front and back images of the ID card
Step 3: Device and Technical Information
Camera and Microphone Data
During the session, access is required to:- Webcam (for face capture and monitoring)
- Microphone (to detect background audio)
Screen Sharing Information
To monitor exam activity, the following is collected:- Entire screen view of the candidate’s system
- On-screen activity during the exam
Device and Browser Information
The platform may collect:- Browser type and version
- Device type (laptop/desktop)
- Operating system information
Step 4: Secondary Device Information
Secondary Device
If a secondary device is used, the following information is processed:- Camera and microphone access on the secondary device
- Verification code used to connect the device
- Live video feed during the session
Environment Scan
During onboarding, the system collects:- A 360° view of the exam environment
- Visual confirmation that no unauthorized materials are present
Step 5: Exam Session Monitoring Data
Session Recording
Throughout the exam, the following may be recorded:- Candidate video feed
- Screen activity
- Audio input
Event Data
The system may log:- Warnings or alerts generated during the session
- Connectivity interruptions
- Exam start and submission times
Step 6: Post-Exam Information
Assessment Submission
After the exam:- Your responses are securely submitted
- Session completion status is recorded
- Feedback is collected
Important Notes
- All data is collected strictly for proctoring and assessment purposes.
- Access is limited to authorized personnel only.
- Information is handled according to applicable data protection and privacy standards.

