![]() ![]() ![]() For instance, we use cookies to help us remember and process the items in your shopping cart. Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the site’s or service provider’s systems to recognize your browser and capture and remember certain information. We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology and via Transport Layer Security ( TLS) Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. We use regular Malware Scanning, SSL/TLS. We do not use vulnerability scanning and/or scanning to PCI standards. We dont sell or share personal infromations. We use your informations to store and synchronize personal informations from your google account so you can have synchronised Timemaker application and for internal application improvment. We collect information when you enter informations into our TimeMaker application and when you want to synchronise your account with google oAuth api. We collect Names, Email addresses, Phone numbers, Addresses, calendars What personal information do we collect from the people that visit our blog, website or app? Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally identifiable information’ (PII) is being used online. ![]()
0 Comments
Leave a Reply. |