PRIVACY POLICY OF PHONE CLONER PHONE SWITCH
PRIVACY POLICY OF PHONE CLONER PHONE SWITCH
Personal Information:
The type of information we get from the user that explicitly
identifies your identity individually or can be used to contact the user online
or offline state, such as the user’s portfolio or we can say that physical
address, mail address, name, email address, picture, exact location
information.
Non-Personal Information:
Axelon IT Apps may collect and use non-personal information
in the following circumstances. To have a better understanding of user
behavior, solve problems in products and services, and improve our products,
services, and advertising, Axelon IT Apps may collect non-personal information
such as installed application name and package name, the data of installed
apps, frequency of the usage, country location, tools, and station.
Permissions we required from the user:
We may collect
some information like permissions about the services that we acquire for use
and how to use them, such as when you aspect and interact with our context and
content. We may collect some user
device information such as hardware model, OS, device identifiers or we can say
device manufacturers and mobile network information.
Sharing of Your Information:
We may share your information:
- With third-party service providers who assist us in
delivering the App's features.
- In response to a request for information if required by
applicable law or legal process.
- With our business partners for joint marketing efforts (if
applicable).
Permissions Taken by Phone Cloner - Phone Switch App :
1. Internet:
Internet permission refers to the authorization granted by a
user to a software application to access the Internet and establish network
connections. This permission enables the application to send and receive data
over the internet, allowing it to interact with remote servers, retrieve
information, update content, and perform various online tasks.
2. Access Network State:
This permission empowers the application to determine the
device's connectivity status, whether it's linked to Wi-Fi or using mobile
data. This knowledge helps the app optimize its internet usage and adapt
behavior based on the current network connection.
3. Manage External Storage: This permission grants the
application the authority to manage files located in the device's external
storage. It includes operations like file deletion and relocation.
4. Write External Storage: With this permission, the
application is allowed to create and store files within its internal storage
space.
5. Read External Storage: By being granted this permission,
the application gains the ability to write or save files to the device's
external storage.
6. Access Coarse Location: This permission allows the
application to access the device's approximate location, which might be
utilized for features like identifying nearby points of interest.
7. Access Coarse Location: With this permission, the
application gains access to the precise geographical coordinates of the device,
facilitating accurate location-based services.
8. Nearby WiFi Devices:
This permission refers to the authorization granted by a
user to a software application to access the WiFi Connection and location to
access wifi devices.
9. Read Contacts:
Read Contacts permission refers to the authorization granted
by a user to a software application to access and retrieve information from the
device's contact list or address book. This permission allows the application
to view and gather details about the contacts stored on the user's device, such
as names, phone numbers, email addresses, and other associated information.
Security:
We take reasonable measures to protect your information from
unauthorized access, loss, misuse, and alteration. However, no method of
transmission over the Internet or electronic storage is completely secure.
Third-Party Links and Services:
Children's Privacy:
Changes to this Privacy Policy:
Contact Us:
Comments
Post a Comment