Last Updated October 12, 2018
2. Information We Collect From You
When you install Alarm for Eldes ESIM 264 application we do NOT COLLECT ANY DATA except application crashes via Google Crashlytics. These informations are for internal use and for continuously improve our app. THESE INFORMATIONS WILL NOT BE SHARED TO ANYONE. When you install Alarm for Eldes ESIM 264, you may also grant the mobile application permission to collect certain types of information via a permission screen consent process. We do not control the permission screen consent process - it is typically run by your mobile operating system. WE MAY COLLECT DEVICE IDS (DEVICE SERIAL NUMBER AND MAC ADDRESS). WE DO NOT COLLECT ANY OTHER PERSONAL OR IDENTIFIABLE INFORMATION. We anonymise all Personal Information on your device before uploading user information to our clouds.
3. How We Use Information
Any information that you submit to us remains your property. However, we may use it for the purposes described herein.
Service. We reserve the right to use the information (no Personal Information) we collect, in order to administer, operate, and continuously improve our Service. We may also use the information to monitor and analyse trends, usage and activities in connection with our Service. We strive to abide by the Safe Harbor rules under www.export.gov/safeharbor_eu
4. Opting Out
Service. You may opt-out of our Service and/or through an email to email@example.com. You will need to provide your mobile ID found in Alarm for Eldes ESIM 264 application(menu -> Backup/Restore section). By default the ID is scrambled. This allows us to identify your device and ensure your device will be opted out from our Service.
Cancellation of Information Collection.
The information will be deleted after the users are opt-out. Please not the the application must be UNINSTALLED on client side in order to not replicate again any data.
5. Proper use
You agree that you will use the Service in compliance with all applicable local, state, national, and international laws, rules and regulations, including any laws regarding the transmission of technical data exported from your country of residence. You shall not, shall not agree to, and shall not authorise or encourage any third party to: (a) use the Service to upload, transmit or otherwise distribute any content that is unlawful, defamatory, harassing, abusive, fraudulent, obscene, contains viruses, or is otherwise objectionable as reasonably determined by the Service; (b) upload, transmit or otherwise distribute content that infringes upon another party’s intellectual property rights or other proprietary, contractual or fiduciary rights or obligations; (c) prevent others from using the Service; (d) use the Service for any fraudulent or inappropriate purpose; (e) interfere with, damage, disable, overburden, impair or disrupt in any way the Service; (f) act in any way that violates the Service policies, as may be revised from time to time. Violation of any of the foregoing may result in immediate termination of this Agreement, and may subject you to state and federal penalties and other legal consequences. Alarm for Eldes ESIM 264 reserves the right, but shall have no obligation, to investigate your use of the Service in order to determine whether a violation of the Agreement has occurred or to comply with any applicable law, regulation, legal process or governmental request.
6. Unsolicited materials
7. Links to Other Services and Websites
The Service, as well as any advertisement or other monetisation means, may contain services, products, and/or links to other services, products, and websites, that are not owned or controlled by us. Please be aware that we are not responsible for the content nor for the privacy practices of these other websites, products, and services. We encourage you to be aware when you access a third party’s website or service and to read the privacy statements of each and every website and service you visit.
The security of your information is important to us. We follow generally accepted industry standards to protect the solicited information submitted to us, both during transmission and once we receive it. However, no method of electronic transmission or method of electronic storage is 100% secure. The information transmitted by SMS are encrypted by vendors.
9. Business Transitions
If we go through a business transition such as a merger, acquisition by another company, or sale of all or a portion of our assets, your data will likely be among the assets transferred.
10. Changes in this Privacy Statement
11. Contacting Us About Privacy Questions or Concerns
12. Governing Law.