What information does the Application obtain and how is it used?
User Provided Information
The Application obtains the information you provide when you enter your email login data such as email address, password and mail server information such as IP address and method of authentication. However, this data is only stored within the Application and is never shared. There is no other information needed or stored.
Automatically Collected Information
In addition, the Application may collect your mobile devices unique device IDandthe IP address of your mobile device, this information is only collected when a request is made to set the background timer which is needed for setting up Apple Push Notifications.
Does the Application collect precise real time location information of the device?
This Application does not collect precise information about the location of your mobile device.
Do third parties see and/or have access to information obtained by the Application?
- There are no third parties which have access to information obtained by the Application.
What are my opt-out rights?
You can stop all collection of information by the Application easily by uninstalling the Application. You may use the standard uninstall processes as may be available as part of your mobile device or via the mobile application marketplace or network.
Data Retention Policy, Managing Your Information
As the Application only stores personal information within the Application itself, there is no need for managing information outside the Application.
We do not use the Application to knowingly solicit data from or market to children under the age of 13. If a parent or guardian becomes aware that his or her child has provided us with information without their consent, he or she should contact us at firstname.lastname@example.org.We will delete such information from our files within a reasonable time.
We are concerned about safeguarding the confidentiality of your information. We provide physical, electronic, and procedural safeguards to protect information we process and maintain. For example, we limit access to this information to authorized employees and contractors who need to know that information in order to operate, develop or improve our Application. Please be aware that, although we endeavor provide reasonable security for information we process and maintain, no security system can prevent all potential security breaches.
If you have any questions regarding privacy while using the Application, or have questions about our practices, please contact us via email at email@example.com.