AppStore Privacy Policy-Don't move my iPhone
Introduction
Don't Move My iPhone is a product provided by rong huang (hereinafter referred to as "we"). When you use our services, we may collect and use your relevant information. Through this Privacy Policy, we would like to explain how we collect, use, store, and share this information when you use our services, as well as the ways we provide you to access, update, control, and protect this information. This Privacy Policy is closely related to the Don't Move My iPhone service you use. We hope you will read it carefully and make choices you deem appropriate when needed, according to the guidelines in this Privacy Policy. We strive to explain technical terms in this Privacy Policy in clear and concise language, providing links for further explanation to facilitate your understanding.
Your use or continued use of our services indicates your agreement to our collection, use, storage, and sharing of your relevant information in accordance with this Privacy Policy.
If you have any questions about this Privacy Policy or related matters, please contact us at huangrongshyf@gmail.com.
1. Information We Collect
We firmly believe in providing excellent products while effectively protecting your privacy. Therefore, we only collect data that we need. The data collected by the App depends on your configured detection methods. We neither save nor transmit your data; it is only valid during the detection period. Here is the data we collect during detection:
Location Information
- This refers to information about your location collected when you enable device location features and use our location-based services, including: geographic location information collected through GPS or WiFi when you use our services on location-enabled mobile devices. You can stop the collection of your geographic location information by turning off location features.
Bluetooth Data
- We value your privacy and only collect and use Bluetooth data when necessary. Bluetooth data refers to information involved when you enable device Bluetooth functionality and pair with, interact with external Bluetooth-enabled devices, or use our Bluetooth technology-based services. For example:
- Device Pairing Information: When you pair Apple devices such as phones and tablets with Bluetooth devices like headphones, speakers, or wristbands, the system records identifying information about these paired devices, such as the Bluetooth device's MAC address (Media Access Control address, used to uniquely identify the Bluetooth device), to enable quick and accurate identification and automatic connection to these paired devices in the future.
- Bluetooth Signal Strength Data: In scenarios where Bluetooth is used for proximity detection, finding nearby devices, and similar functions, we may collect signal strength data during communication between Bluetooth devices. By analyzing this signal strength information along with certain algorithms, we can roughly determine the distance between devices, helping to implement features such as finding nearby Apple devices that have Bluetooth enabled and meet specific conditions.
Sensor Data
- When you enable relevant detection configurations, we collect information about device orientation and horizontal positioning to determine whether to trigger alerts.
Device Data
- When you enable battery status change detection configuration, we only collect the phone's charging status data.
2. Information Storage
2.1 Information Storage Methods and Duration
- We only use and store data during the detection task runtime, and data is stored only in memory. Most data is automatically deleted when the detection task ends, and remaining log data is cleared when the App exits or when the next detection task begins.
3. Information Security
We use various security technologies and procedures to prevent information loss, misuse, unauthorized access, or disclosure. For example, in certain services, we use encryption technology (such as SSL) to protect your personal information. However, please understand that due to technical limitations and potential malicious methods, in the internet industry, it's impossible to guarantee 100% information security even with maximum security measures. You need to understand that the systems and communication networks you use to access our services may experience problems due to factors beyond our control.
4. How We Use Information
We only use information for your detection tasks.
5. Information Sharing
Currently, we do not share your information with third parties.
6. Your Rights
While you use our services, we may provide appropriate operational settings depending on specific product circumstances to allow you to query, delete, correct, or withdraw your relevant information.
7. Changes
We may revise the terms of this Privacy Policy as needed. When changes occur, we will notify you of the new Privacy Policy during version updates and inform you of the effective date. Please carefully read the modified Privacy Policy content. Your continued use of our services indicates your agreement to our handling of your personal information in accordance with the updated Privacy Policy.
8. Protection of Minors
We encourage parents or guardians to guide minors under eighteen years of age in using our services. We recommend that minors encourage their parents or guardians to read this Privacy Policy and seek parental or guardian consent and guidance before submitting personal information.
评论已关闭