IVision Infosys - Privacy Policy

IVision Infosys (“us”, “we”, or “our”) built the apps as a Free app and operates various associated software components, media, printed materials, and online services and documentation (the “Software Product”). This page informs you of our policies regarding the collection, use and disclosure of  Personal Information we receive from users of the Software Product.

We use your Personal Information only for providing and improving the Software Product. By using the Software Product, you agree to the collection and use of information in accordance with this policy.

If you have any questions about this Privacy Policy, please contact us.

1. Information we collect
We collect information to provide better services to all of our users, like figuring out which language they speak, or own often a particular feature is used.
We collect information in the following ways:

  • Information you give us. For example when you report an error, suggest a new feature, or create an account.
  • Information we get from your use of our services. When you use our services, we may automatically collect and store certain information in server logs. This includes details of how you used our services, such as Internet protocol address, device event information such as crashes, system activity, hardware settings, browser type, browser language and the date and time of your request.

Personal Information

Personal Information is the type of information that specifically identifies or contacts a person, such as your full name or email address. We may collect personally identification information whenever Users enter into our app, fill out the form, to use our services, features or resources present in our app.

In the following circumstances, we may disclose your personal information according to your wish or regulations by law:

1) Your prior permission,

2) By the applicable law within or outside your country of residence,legal process, litigation requests,

3) By requests from public and governmental authorities,

4) To protect our legal rights and interests.

Non-Personal Information

Non-personal information is data in a form that does not permit direct association with any specific individual, such as your install, uninstall, Android ID, phone IMEI number, phone model etc.

We may collect and use non-personal information in the following circumstances.

1) To have a better understanding in user’s behavior.

2) Solve problems in products and services.

3) Improve our products, services and advertising.

We may collect non-personal information such as the data of install, frequency of use, country and channel. 

Information we get by using our services

We may collect information about the services that you use and how you use them, such as when you view and interact with our content. We may collect device-specific information (such as your hardware model, os version, and unique device identifiers).

Location information

When you use a location-enabled service, we may collect and process information about your actual location through GPS signals sent by a mobile device or Wifi in order to obtain your location for the purposes of providing our Service. We may also use various technologies to determine location, such as sensor data from your device that may, for example, provide information on nearby Wi-Fi access points and cell towers.

2. How we use information we collect
We use the information we collect from all of our services to provide, maintain, protect and improve them, and to develop new ones.

3. Information we share
We do not share personal information with companies, organizations and individuals.

4. Accessing and updating your personal information
Whenever you use our services, we aim to provide you with access to your personal information. If that information is wrong, we strive to give you ways to update it quickly or to delete it, unless we have to keep that information for legitimate business or legal purposes. When updating your personal information, we may ask you to verify your identity before we can act on your request.
We may reject requests that are unreasonably repetitive, require disproportionate technical effort (for example, developing a new system or fundamentally changing an existing practice), risk the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup systems).
Where we can provide information access and correction, we will do so for free, except where it would require a disproportionate effort. We aim to maintain our services in a manner that protects information from accidental or malicious destruction. Because of this, after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.

5. Third party components
We use the Google Analytics framework to get non-personally identifiable information about the use of our services, allowing us to improve their quality. We also use the Google AdMob framework to monetize the free version of the Software Product. While we do not share any information we collect with them, those third party components may collect data for their own needs. You can review the Google Privacy Policy here.

6. Security
The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

7. Compliance and cooperation with regulatory authorities
We regularly review our compliance with our Privacy Policy. When we receive formal written complaints, we will contact the person who made the complaint to follow up. We work with the appropriate regulatory authorities, including local data protection authorities, to resolve any complaints regarding the transfer of personal data that we cannot resolve with our users directly.

8. Kids Privacy Policy

This Kids Privacy Policy has to be specified to indicate you, with guidance regarding our privacy policies with respect to collecting, using and disclosing personal information, regarding the legal guardian of a child under the age of 13 years old.

Many of our Games/Apps are intended for general audiences, and we do not knowingly gather or use any Personal Information from children and kids under the age of 13. When users are identified as under 13, we will block such users from providing Personal Information or make sure to get prior parental consent before collecting Personal Information.

If you are a parent of a child under 13 years of age and you think your child has provided us with Personal Information, please contact us.

We offers mobile applications and games (Kids Apps), which are targeted to children under the age of 13 and also other apps are not targeted under the age of 13.

If you have additional questions about our Privacy Practices related to children under the age of 13, please contact us. 

9. When this Privacy Policy applies
Our Privacy Policy applies to all of the services offered by us.

10. Changes
Our Privacy Policy may change from time to time. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any privacy policy changes on this page and, if the changes are significant, we will provide a more prominent notice (including, for certain services, email notification of privacy policy changes). We will also keep prior versions of this Privacy Policy in an archive for your review. 

Why we needs permission :-

1. ACCESS_NETWORK_STATE:

Some of our applications may use this permission to access information about networks. In our apps we will just give you information about the network, such as whether you are connected to a network or not. We don’t collect and share information to others.

2. ACCESS_COARSE_LOCATION

Some of our applications may use this permission to access approximate location derived from network location sources such as cell towers and Wi-Fi. This information is untraceable. We don’t collect and share location information to others.

3. ACCESS_FINE_LOCATION

Some of our applications may use this permission to access precise location derived from network location. This information is untraceable. We don’t collect and share location information to others.

4. WRITE_EXTERNAL_STORAGE and READ_EXTERNAL_STORAGE

Some of our applications may use these permissions to access Media files form USB storage. We don’t collect, store or share information.

5. INTERNET:

Some of our applications may use this permission to open network sockets. In our apps we are using INTERNET permission to use the internet only. We don’t collect or transfer network information.

6. READ_PHONE_STATE

Some of our applications may use this permission to access phone state, including the phone number of the device, current cellular network information, the status of any ongoing calls, and a list of any phone Accounts registered on the device. We don’t collect, store or share any information.

7. CALL_PHONE

Some of our applications may use this permission to initiate a phone call without going through the Dialer to check the USSD codes. We do not collect or share this information.

8.READ_CONTACTS

Some of our applications may use this permission to read your contact information when you request. We do not collect or share this information. We use this permission to announce caller name or to display dialed / received calls / missed calls when you request.

9.READ_GSERVICES

Some of our applications may use (parts of) the Google Services Framework, it must declare the READ_GSERVICES permission. This information is untraceable.

10.VIBRATE

Some of our applications may use this permission to know vibration state and change vibration state when user needs.

11.WAKE_LOCK

Some of our applications may use this permission to access Power Manager Wake Locks to keep processor from sleeping or screen from dimming. When user want to display digital clock on screen.

12.RECEIVE_BOOT_COMPLETED

Some of our applications may use this permission to allow alarm, Background services etc,. After booting has been completed.

13. SET_ALARM

Some of our applications may use this permission to access alarm from devices and sets.

14.SEND_SMS, READ_SMS, RECEIVE_SMS

Some of our applications may use these permissions to read, send or receive SMS from device. We don’t collect, save or share your messages. This is highly securable.

15. SET_WALLPAPER

Some of our applications may use this permission to set selected image as wallpaper.

16.SET_WALLPAPER_HINTS

Some of our applications may use this permission to adjust and resize selected wallpaper size.

17.ACCESS_WIFI_STATE

Some of our applications may use this permission to access information about Wi-Fi networks. We don’t collect or share any information about Wi-Fi.

18. CHANGE_WIFI_STATE

Some of our applications may use this permission to change Wi-Fi connectivity state (WIFI ON / WIFI OFF) when you request.

19.BLUETOOTH

Some of our applications may use this permission to connect the paired Bluetooth devices when you request.

20.BLUETOOTH_ADMIN

Some of our applications may use this permission to discover and pair Bluetooth devices.

21. BLUETOOTH_PRIVILEGED

Some of our applications may use this permission to pair Bluetooth devices without user interaction, and to allow or disallow phonebook access or message access. We don’t save or share information.

22. WRITE_SECURE_SETTINGS

Some of our applications may use this permission to access device secure settings. We don’t collect or share information.

23. WRITE_SETTINGS

Some of our applications may use this permission to switch or adjust system settings such as ringtone, vibration and brightness of the screen etc., when you request.

24. CAMERA

Some of our applications may use this permission to take photos / videos and turn ON/OFF Camera Flash, when you request. We do not save or upload your photos/videos.

25. FLASHLIGHT

Some of our applications may use this permission to turn ON/OFF Camera Flash. we use this permission for taking photos, flashlight on alert services or flashlight on clap services.

26. DISABLE_KEYGUARD

Some of our applications may use this permission to access our application functionality after the screen turned off.

27. RECORD_AUDIO

Some of our applications may use this permission to record an audio sound when you request. We don’t collect or share the information.

28. MODIFY_AUDIO_SETTINGS

Some of our applications may use this permission to modify global audio settings as your request.

29. BATTERY_STATS

Some of our applications may use this permission to access battery information such as battery percentage, capacity etc., to display battery performance.

30. GET_ACCOUNTS

Some of our applications may use this permission to detect whether users have a Google accounts or not, to confirm the state of Google Services, provide users with particular application download or update methods. We don’t share or save your account information in any manner. It is highly securable.

31.SYSTEM_ALERT_WINDOW

Some of our applications may use this permission to create windows and may show on top of other application.

32.READ_CALENDAR

Some of our applications may use this permission to read CALENDER info. We don’t share and save this information.

33. READ_CALL_LOG and WRITE_CALL_LOG

Some of our applications may use these permissions to display call logs from devices. We don’t collect, save or share your call information. This is highly securable.

34. CLEAR_APP_CACHE

Some of our applications may use this permission to clear all the caches from all installed applications when you request.

35.KILL_BACKGROUND_PROCESSES

Some of our applications may use this permission to clear all the background process from your device when you request.

36. GET_PACKAGE_SIZE

Some of our applications may use this permission to find out the space of used applications So, you can manage mobile space.

37. MOUNT_UNMOUNT_FILESYSTEMS

Some of our applications may use this permission to inserting and removing file systems for external storage.

38. READ_SYNC_SETTINGS and WRITE_SYNC_SETTINGS

Some of our applications may use these permissions to allow SYNC settings for battery power saving.

39. RESTART_PACKAGES

Some of our applications may use this permission to kill Background Processes. It allows them to break other applications by removing their alarms, stopping their services, etc. we use these permissions to improve mobile performance when user requests.

40. REAL_GET_TASKS, GET_TASKS

Some of our applications may use these permissions to get tasks. We don’t collect, save or share your task information.

Contact us :

If you have any questions about this Privacy Policy, the practices of this site, or your dealings with this site please feel free to contact us at : ivision.infosys@gmail.com

Comments