Zeta’s representative advantages arrangement makes it simple for you to spare charges. No more paper vouchers or repetitive procedures – with Zeta, your organization can give you completely advanced representative advantages that you would then be able to use through the Zeta application or card.
This is what you get with Zeta
• Complete advantages suite: Zeta offers a total advantages suite including Meal Vouchers, Medical, Fuel and Communication repayments, LTA, Books and Periodicals and the sky is the limit from there.
• One arrangement, different approaches to spend: Spend your advantages in numerous ways – swipe the Zeta Super Card at stores or internet business applications, utilize the Zeta application/NFC tag at upheld dealers and even make charge installments inside the Zeta application.
• Cashless cafeteria installments: With Zeta’s Express Cafeteria arrangement, pay with your assessment sparing Meal Vouchers at your organization cafeteria and skirt long lines. What’s not to cherish.
• Rewards that look great and feel extraordinary: Still getting paper blessing vouchers from your organization? Change to Zeta’s excellent advanced gift vouchers.
• Super-secure: Zeta is worked with various layers of security and encryption to keep your cash and information secure.
Consents required by your Zeta application:
Zeta requires the accompanying consents to give you an astounding client experience:
• Contacts: Used to send cash to your contacts and secret key recuperation through ‘Confided in Contacts’
• Location: Used to discover Zeta-tolerating dealers close to you
• SMS: Used to naturally top your OTP during close down, Aadhaar check and so forth
• Phone: Used to call bolster group from the application straightforwardly
• Photos/Media/Files: Allows you to transfer repayment bills if your organization approach underpins it
• Camera: Used to examine trader’s QR code for moment installments
• Wifi association: Used to pack charges before transferring in the event that you are on moderate systems
• Device ID (IMEI/MAC address) and call data: Used to expand security by inciting for extra validation when a client attempts to login from an alternate gadget