Personal
Full name, date of birth, gender, phone, email, and address.
Platform services
Know To Win includes a structured loan application module that allows learners to submit, track, and manage an education loan request. All personally identifiable and financial data is encrypted at rest — each application uses its own unique encryption key.
Application scope
The education loan module captures everything a loan provider needs in a single structured flow.
Full name, date of birth, gender, phone, email, and address.
Institution, course type, duration, HSC and graduation marks, entrance exam score, total course fees, fee structure, and admission letter.
Family annual income, applicant income, co-borrower income, and existing liabilities.
Amount requested (up to ₹1 Cr), purpose, repayment tenure, interest rate, EMI estimate, grace period, and prepayment options.
Type, valuation, and documentation URL for any collateral being offered.
Name, relationship, KYC document, and bank statement.
Bank name, account number, and IFSC code for the receiving account.
Category certificate, applicable government scheme, and subsidy eligibility proof.
Expected employment role and placement proof URL after course completion.
Application lifecycle
Fill in your details at your own pace. Nothing is submitted until you choose to submit.
Your completed application is sent for review by the platform team.
The platform team routes the application to a loan provider. Additional document requests may be raised at this stage.
Application is approved or returned with notes requesting revision. The full history of status changes is preserved.
Your data is protected
Every education loan application uses a unique Data Encryption Key (DEK). Personal details, contact information, income figures, bank account details, and guarantor information are all encrypted with this key before they are stored. Access to decrypted data is controlled by the platform's admin key system.
Each application gets its own unique DEK — no two applications share the same key, so a single key exposure cannot compromise other records.
Name, contact details, income figures, bank account number, IFSC code, guarantor name and documents, and all uploaded document URLs are encrypted before storage.
Even the search index uses HMAC n-gram techniques so encrypted PII fields can be looked up without ever decrypting in bulk.
Ready to apply?
Your draft is saved automatically — come back and complete it whenever you are ready.