Information we collect
A key component of many of our Apps is to assist you in identifying potentially unwanted telephone calls. To do so, we may collect information automatically from your device, including your phone number, your contacts, and your calls and text logs. We will match the information provided with numbers from incoming calls and messages and information in our database.
We may also automatically collect read-only phone state such as your network information, mobile device ID (or other identifier as permitted by the manufacturer)y mobile carrier, location and language information, device name and model, operating system type, name, and version, your activities within the App, and the length of time that you may be logged into an App.
Use of Personal Information
We assure you that protection of your personal data and all of the data is an absolute priority for us. Only employees of our company with a strictly specified authorization have an access to your personal data. The rules for the allocation of rights together with the rights for access and handling the data are controlled by the regularly authorized directions and procedures. In no case do we provide third parties with your personal data without your consent. The only exception is the data transfer to authorized authorities in accordance with generally binding legislation, especially based on the request of the Police of the Czech Republic or courts. As a provider we are also entitled to interrupt your service and access to your data in case of exposing ourselves, our employees or other people to the risk of criminal responsibility, or if you do not follow up your commitments towards our company in the agreed time. These measures are however used only in extreme cases and they are to limit possible negative impacts arising from the illegitimate operation of the service.
Information Security and Accuracy
We intend to protect your personal data and the data stored in our systems in agreement with proven methods for information protection. We are constantly improving and implement state-of-the-art technical, physical and administrative protective measures to help to protect your personal information, data and collected information from unauthorized use.