This Privacy Policy (the "Policy") explains the way of treatment of the information which is provided or collected in the websites on which this Policy is posted. In addition the Policy also explains the information which is provided or collected in the course of using the applications of the Company which exist in the websites or platforms of other company.
Through this Policy, the Company regards personal information of the users as important and inform them of the purpose and method of Company's using the personal information provided by the users and the measures taken by the Company for protection of those personal information.
What information does the Application obtain and how is it used?
The Application does not provide an option to create an account therefore, we do not store nor have access to your entries and data. Your data are stored only locally on your device and all calculations are done on your device as well. You can optionally backup your data to Google Drive (Android) or to Apple iCloud (iOS). Your backups are stored in your private cloud space and we don’t have access to your backup files.
We obtain your email address when you request support via email or customer support contact form. We use your email only to contact you to provide support, feedback or important information.
Procedure and method of destruction of personal information
In principle, the Company destructs the information immediately after the purposes of its collection and use have been achieved without delay: Provided that, if any information is to be retained as required by relevant laws and regulations, the Company retain it for the period as required by those laws and regulations before destruction and, in such event, the personal information which is stored and managed separately will never be used for other purposes. The Company destructs: hard copies of personal information by shredding with a pulverizer or incinerating it; and delete personal information stored in the form of electric file by using technological method making that information not restored.
Cookies and Similar Technologies
The Company and its service providers may use first and third party Cookies and Other Tracking Technologies, including web beacons, to manage our Sites and our services and collect analytics about how you use them. The Company and its service providers may collect information about whether you open or click any links in the knowledge, research or event communications that we send to you. The information provided throughout this Privacy Policy about cookies also applies to these other tracking technologies. Please refer to our Cookie Policy for more details regarding our use of Cookies and Other Tracking Technologies.
The users have an option for cookie installation. So, they may either allow all cookies by setting option in web browser, make each cookie checked whenever it is saved, or refuses all cookies to be saved: Provided that, if the user rejects the installation of cookies, it may be difficult for that user to use the parts of services provided by the Company.
Security
The Company regards the security of personal information of uses as very important. The Company constructs the following security measures to protect the users' personal information from any unauthorized access, release, use or modification by the Personal Information protection Act.
• Establish and implement an internal privacy management plan. Establish an internal personal information management plan, containing matters in relation to the composition and operation of the privacy organization, such as the designation of privacy personnel, and inspect whether the internal management plan is implemented effectively each year. Provide education and training for staffs treating personal information.
• Actions are undertaken to control access to and restrict the right to access personal information. In order to prevent illegal access to personal information, The Company has established the standards for granting, modifying, and canceling access rights to the personal information processing system, and runs an intrusion prevention system and intrusion detection system. Employees that handle personal information are kept to a minimum, thereby reducing the risk of personal information leakage.
• Actions are taken to store personal information access records and prevent any forgery and tampering. The personal information handler stores and manages access records for the personal information processing system, periodically inspects access records to prevent any misuse, abuse, loss, forgery, and tampering of personal information, and safely stores the relevant access records so that they are not forged, stolen, or lost. Utilize security servers for transmitting encryption of personal information. Take measures of encryption for confidential information.
• The Company installs and renews security programs for personal information. The Company frequently backs up data to offset risk of any damage to personal information, and uses the latest antivirus software to prevent leakage or damage of users' personal information.
• The Company enforces physical actions to keep personal information safe. In order to prevent leakage or damage of members' personal information caused by hacking or computer viruses, The Company installs systems in areas with restricted access from the outside, and establishes and operates access control procedures.
Backup
The Company advise our users to regularly backup their data. Our users can choose to manually export the backup file and store it wherever they want or they can optionally make cloud backups. The cloud backups are kept in users' private cloud space where the Company have no access.
Android Google Drive Backups Android users can optionally backup their data using Google Drive. Their backups are stored in their private Google Drive space and count against their quota. The Company use a secure connection to your Google Account and data is safely stored in a folder where the Company nor other apps have access. View Google Privacy Policy at https://www.google.com/policies/privacy/
The email and name permissions within the Android are requested in order to display the account details within the app to inform users about the account which is being used for the backups. The app does not keep email addresses and names within the app. The app asks Google Sign In for a connected account and displays the account info only when accessing the Backup section. Even if the user agreed to anonymous analytics data collection your email address or name is never sent with the analytics data.
iOS iCloud Backups iOS users can optionally backup their data using iCloud Drive. Their backups are stored in their private iCloud Drive space and count against their quota. iCloud secures your information by encrypting it when it's in transit, storing it in iCloud in an encrypted format, and using secure tokens for authentication. For certain sensitive information, Apple uses end-to-end encryption. This means that only you can access your information, and only on devices where you’re signed into iCloud. No one else, not even Apple, can access end-to-end encrypted information. You can find out more about iCloud security and privacy overview at iCloud data security overview - Apple Support
Protection of personal information of children
In principle, the Company does not collect any information from the children under 13 or equivalent minimum age as prescribed in the laws in relevant jurisdiction. The website, products and services of the Company are the ones to be provided to ordinary people, in principle. The website or application of the Company has function to do age limit so that children cannot use it and the Company does not intentionally collect any personal information from children through that function.
Definitions and legal references
Personal Data (or Data)
Any information that directly, indirectly, or in connection with other information — including a personal identification number — allows for the identification or identifiability of a natural person.
Usage Data
Information collected automatically through this Application (or third-party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application, the URI addresses (Uniform Resource Identifier), the time of the request, the method utilized to submit the request to the server, the size of the file received in response, the numerical code indicating the status of the server's answer (successful outcome, error, etc.), the country of origin, the features of the browser and the operating system utilized by the User, the various time details per visit (e.g., the time spent on each page within the Application) and the details about the path followed within the Application with special reference to the sequence of pages visited, and other parameters about the device operating system and/or the User's IT environment.
User
The individual using this Application who, unless otherwise specified, coincides with the Data Subject.
Data Subject
The natural person to whom the Personal Data refers.
Data Processor (or Data Supervisor)
The natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the Controller, as described in this privacy policy.
Data Controller (or Owner)
The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data, including the security measures concerning the operation and use of this Application. The Data Controller, unless otherwise specified, is the Owner of this Application.
This Application
The means by which the Personal Data of the User is collected and processed.
Service
The service provided by this Application as described in the relative terms (if available) and on this site/application.
Cookies
Small piece of data stored in the User's device.
Contact Us
If you have any questions regarding privacy while using the Application, or have questions about our practices, please contact us via email at [email protected]