shahabgraph@yandex.com built the ShahabGraph app as a Free app. This SERVICE is provided by shahabgraph@yandex.com at no cost and is intended for use as is.
This page is used to inform visitors regarding my policies with the collection, use, and disclosure of Personal Information if anyone decided to use my Service.
If you choose to use my Service, then you agree to the collection and use of information in relation to this policy. The Personal Information that I collect is used for providing and improving the Service. I will not use or share your information with anyone except as described in this Privacy Policy.
The terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, which is accessible at ShahabGraph unless otherwise defined in this Privacy Policy.
Information Collection and Use
For a better experience, while using our Service, I may require you to provide us with certain personally identifiable information. The information that I request will be retained on your device and is not collected by me in any way.
The app does use third party services that may collect information used to identify you.
Link to privacy policy of third party service providers used by the app
Log Data
I want to inform you that whenever you use my Service, in a case of an error in the app I collect data and information (through third party products) on your phone called Log Data. This Log Data may include information such as your device Internet Protocol (“IP”) address, device name, operating system version, the configuration of the app when utilizing my Service, the time and date of your use of the Service, and other statistics.
Cookies
Cookies are files with a small amount of data that are commonly used as anonymous unique identifiers. These are sent to your browser from the websites that you visit and are stored on your device's internal memory.
This Service does not use these “cookies” explicitly. However, the app may use third party code and libraries that use “cookies” to collect information and improve their services. You have the option to either accept or refuse these cookies and know when a cookie is being sent to your device. If you choose to refuse our cookies, you may not be able to use some portions of this Service.
Service Providers
I may employ third-party companies and individuals due to the following reasons:
- To facilitate our Service;
- To provide the Service on our behalf;
- To perform Service-related services; or
- To assist us in analyzing how our Service is used.
I want to inform users of this Service that these third parties have access to your Personal Information. The reason is to perform the tasks assigned to them on our behalf. However, they are obligated not to disclose or use the information for any other purpose.
Security
I value your trust in providing us your Personal Information, thus we are striving to use commercially acceptable means of protecting it. But remember that no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and I cannot guarantee its absolute security.
Links to Other Sites
This Service may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by me. Therefore, I strongly advise you to review the Privacy Policy of these websites. I have no control over and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.
Children’s Privacy
These Services do not address anyone under the age of 13. I do not knowingly collect personally identifiable information from children under 13. In the case I discover that a child under 13 has provided me with personal information, I immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact me so that I will be able to do necessary actions.
Privacy terms in cheshmak
Using the cheshmak system over the Internet requires some information exchange between users and the system. Your use of the cheshmak system means your trust in us, the mobile statistic company as the provider of the cheshmak system, hereinafter referred to as "cheshmak". So you need to know enough about what this document intends to tell you clearly about what information you may receive, why it is obtained from you, and how it is used. As a result, by reading this document, you will become familiar with the terms of your personal information and privacy when using the cheshmak system.
1. The information you receive and why you collect it as a developer or owner of a mobile app or website, using the cheshmak system to enhance the capabilities of your app or website to get in touch with your users, as well as to obtain statistical reports from your app or website or users You use. So the information you may collect from the cheshmak system is in two general categories:
a) Personal information about yourself
b) Information about users of the app or website This section, the information that may be collected in either of these categories, is clearly and fully explained and the reason for their collection.
1. Personal information about yourself
1. The information you provide to the system
Email Address: You must register in order to log in to the flashing system to provide the correct email address for the system.
○ Phone and Address: For security issues, information such as a valid phone number or address may also be received from you, which can be accessed by email or phone or letter in case of any major changes to your account. Getting your verbal or written confirmation boosts your safety, and making sure your person is making the changes. These links may also be used to inform you about important changes to the system or its terms, or to send you the necessary documents.
○ Individuals and Bank Accounts: In cases where you need to be paid, or paid for, in accordance with the laws of the Department of Taxation and other parts of the country, some personal information such as national number, name and name may be required. Family or other ID and registration details as well as bank account information.
Your Content: All the content you produce or place on the system, such as your applications and websites and their specifications, messages, and more, is stored on our servers so that your information and content are always accessible and accessible to you. Use is for you and for us, as well as organizing system information and services, as well as maintaining security and preventing fraud.
2. Information that is automatically collected
و How and how you connect to the system: When you use the system services, you may receive information such as the device and software you are logged into, your device's operating system, your IP address and location, and the previous page through which you entered it. You have a system to collect. This is done to increase the security and prevent intrusion into your account by others, as well as to improve system performance and quality.
○ How you use the system: We may also use cookies and similar technologies to collect information about how you use the services of the system and store your activity history on our servers, thereby facilitating usability. You created the system services and filled the various parts.
2. Data about your users The effect of your use of the system, the users of your app or website is linked to the system, and you can communicate with them. We receive a variety of data through your users' use of your app or website, which is an important part of providing system, analytics, and statistical reporting to your users. However, some of this data will be collectable from your users if you have the relevant permissions on your app or website, and user device settings also. Given the volume and extent of this data, we may not be able to provide much of this data raw. However, this data is used to provide system services, and users must obtain the consent and consent of us to receive the data, which is entirely your responsibility. Of course, cheshmak can also inform your users about the terms of use of the cheshmak system. This data may be periodically downloaded during the time a user is using your app or website, so that, in some cases, existing features may be updated and their history available. The following is a detailed list of data that may be obtained from users and the reason for their removal. However, depending on system requirements and user device settings or access to your app or website, some or more of this data may not be collected.
1. General Features of the Device Depending on the type of access available to the user device and the needs of the system, the following data may be removed from the user device:
Physical ID of the device
○ Screen size
○ Brand
○ Model
○ Android version
Android ID
○ Google Play version
○ Operator name
○ SIM card
○ List of installed applications
Advert Google Advertising ID (advertisment_id) These features are typically collected to provide you with some statistical reports, to give you an estimate of what your users are and their interests, and on what devices your app or website is typically visited, and users What kind of apps do you typically have. Some of this information is also required for system services, such as device ID and ad ID, which are used to send a test notification or identify the number of unique users among your total installations. This data is also required to apply advanced filters to send notifications (such as Android based receivers or phone brand filters).
2. Location (latitude and longitude of the device) In order for you to be able to send them notifications based on your users' location, as well as to have a statistical distribution of the different features of users, you need to get their location. Therefore, if the approximate or precise location access is set in the application and the user's device settings are not prevented from accessing it, the system will periodically attempt to retrieve and store users' locations.
3. Internet and Network Connection Specifications To operate the flashing system, full access to the user's device's Internet connections and internet is required and if the user restricts access, the cheshmak library will not be able to function in your application or website. But with this access, the following data will be collected:
○ Type of Internet (WiFi or Mobile) and if using Mobile, Connection Type (Multi Generation) and Operator Name and Roaming Status
Device IP in internet connection
○ When internet connection and traffic volume are exchanged
○ List of WiFi networks with MAC address and their signal strength
○ List of mobile network towers available and their signal characteristics and power This data is in addition to being needed to provide some statistical reporting to your users and better analytics, to improve system service delivery (such as reducing error detection Longitude and latitude, or increasing the percentage of messages sent to users or messages received from them) as well as defining new services (such as filtering users by Internet type).
4. Data related to your application or website
Closed name
Version name and app version code
Version name and version code of the flashing library
How to install the app (directly from the market, Google Play, etc.)
User IP when installing the app
○ When the user uses the app
Errors in the application runtime The most common use of this data is to provide you with analytics and how the app or website works so that you can, for example, report bugs related to the app, identify bugs and improve your app. Try it, or estimate the appeal of it by knowing how many users are using your app or website. However, some of this data (such as app versions or the cheshmak library or usage level) is also required for recipients to filter notifications.
5. User Functional Data Just as the amount of user usage can be important to the app owner and help him or her to upgrade or produce other suitable applications, how the user interacts, responds and performs in some cases can be very important. In the background
Software development and related ancillary services. So the following data may also be collected depending on the capabilities of the cheshmak libraries and what access is given to your app on the user's device:
○ User notification time
User response to notifications such as clicks or rejects
○ User Internet connection specification when responding to a notification
Device boot times Device screen switches on and off
User modes (such as driving, running, walking, cycling and idle) are the most reliable use of this data in providing notifications, as well as other performance statistics, with one percentage of confidence. However, some of this data (such as device activity times) may be used to improve the quality of sending and receiving notifications and other system functions.
6. Other Case Data Given that the cheshmak service portfolio is dynamically changing and growing, and always trying to add new and useful services to the system, it may be possible to define some new services in the future. Give some access to the cheshmak library. For example, access to "subscriptions" or "contacts" may be defined as services such as sending email in a specific way, or performing financial transactions such as purchasing a charge, or distributing ads to the user, or other services that require that access. Or other access. However, data that is necessary to access basic and basic cheshmak services without which the primary system services cannot be provided will be forced into the flashing libraries and you will not be able to delete these accesses. do.But access to this section, as well as access to previous sections, to which the main system services were not dependent, and to additional services (such as some analytics or monetization services), depending on the technical features It is attempted to be optional, so that you can either disable or disable these accesses, and the user can either enable or disable them.
How to use the collected information Generally the collected information is used to provide, maintain, and improve system services, and to develop new services. For example, information from cookies and your performance records may be used to customize the content in your account to provide tailored suggestions for filling in various sections of the system forms. For example, information about our financial transactions with you is used in legal matters and in the settlement of tax accounts. The information collected from you and your users is always analyzed, and based on that, charts and statistics that may be useful to you may be produced. There may also be some general statistics of your users' data or the total of users, or the total of developers, that may be exploited publicly. Plus it is possible to use the results of the analysis
The data we collect, suggestions for how you will interact with your users, or content that suits you or your users, or the proper way to send content to them. Also, we may, by fully protecting the privacy of you and your users, without disclosing any personally identifiable information or personally identifiable information, to the results of the analysis of existing information that is purposeful and applicable to businesses or businesses. And do various things, and provide them to their owners, or use this information to provide other services to the company.
3. Sharing and Information Security We do our best to protect your information and prevent unauthorized access to it. Of course, given the realities of cyberspace, there is always the potential for danger, so if there is a leak of information that, despite all efforts, we cannot prevent, it will not be our responsibility. Also, your information and your users' data collected through the system and linked to your account will be treated as your personal information and will never be shared with anyone except:
1. With your consent: If you have consented to have your information shared with individuals or entities outside the company, we may do so.
2. Information Processing: If your information processing requires that information be disclosed outside the company, then we will share the information collected with trustworthy individuals or legal entities in accordance with our guidelines and policies. Wink's privacy, and other security and confidentiality principles, merely process information and make no other use of it. In this case, we will continue to protect your privacy under this document, and we are committed to not sharing your information with others in accordance with the provisions of this document.
3. For legal reasons: If we make sure that other people's access to your personal information is reasonably necessary or permitted, we may share your personal information with non-corporate or legal entities outside of the following:
(a) Enforcement of any applicable law, or any applicable legal, judicial, or governmental provisions or orders.
b) enforce the Terms of Service applicable to identify violations and conduct inspections.
c) identifying or preventing fraud, or safety, or technical problems, or dealing with them.
d) protect the rights or property or safety of the Company, or users of the System, or the general public, as required by applicable laws and regulations.
4. Sharing non-personally identifiable information:
It is always possible to share non-personally identifiable information, or information that is personally identifiable with the public, or with parties to our contract, such as publishers, advertisers, and researchers. For example, we may share some statistics about the general behavior of users in the face of notifications.
5. Access to data within cheshmak: Within the company, only employees whose business responsibilities require access to users' personal information are provided with such a facility. In addition, these employees are subject to strict rules on the protection and confidentiality of information, who may be fired or punished if they fail to comply with the necessary security requirements. We also always maintain the confidentiality of personal information when merging with other collections, or selling assets or belongings that require the transfer of information to a new collection, and if the transfer of information requires new and completely different privacy policies than before. If so, we will notify the relevant users and obtain the necessary approvals from them, and if they do not agree, their information will not be transmitted.
4. Maintaining and deleting data is continually backed up by all the information that comes to our servers, and is stored in our servers memory for initial exploitation or updating of previous data. Also, to enhance the reliability, several backups may be made and maintained over time. In addition, all activities that occur in the cheshmak system suite, whether the activities of the users or the activities of the system itself, are all recorded by the monitoring subsystems and stored in a log of performance records. The information stored on the servers is used for the online use of users and the performance of system components, and the information stored in backups is retained to retrieve server information in the event of a problem. Functional reports are also maintained for technical, security, troubleshooting, troubleshooting, and other administrative functions. Therefore, as long as your account is available, the relevant information will be retained, and if you choose to close your account or remove certain content within it, depending on the blinking conditions, the relevant data may also be stored from storage. Our hardware may be phased out, or for security, technical or commercial reasons, this data may still be stored in server or backup memory.
5. Accepting and applying the terms of your use of the cheshmak system constitutes acceptance of these policies. Some intermediate programs may also provide you with a confirmation page for this document, which is a confirmation of the acceptance of the policies stated in this document. We are also committed to the provisions of this document, and are constantly monitoring and inspecting its compliance with internal oversight mechanisms. If we receive a complaint about an individual's privacy violation, we will contact the relevant user, and we will use our best efforts to resolve any potential issues. We will also work closely with government and judicial authorities to protect the rights of users and others.
6. Changes to the policies set out in this document are regularly reviewed and reviewed and may be amended at any time. Updated versions of this document are located at the relevant address on the System website. If you decide that you will no longer use the Services in accordance with the policies of this document, or its updated documentation, you must close your account. We will never reduce your rights under these privacy policies without your consent. Therefore, if the changes made to this document do not require a tangible reduction of your rights, new items will always apply immediately after the changes are made, otherwise, no later than 14 calendar days after the changes are announced, giving you the opportunity Enough to know about it and decide to accept it. It is natural that your continued use of the cheshmak system after the due date will constitute acceptance of new policies.
Changes to This Privacy Policy
I may update our Privacy Policy from time to time. Thus, you are advised to review this page periodically for any changes. I will notify you of any changes by posting the new Privacy Policy on this page. These changes are effective immediately after they are posted on this page.
Contact Us
If you have any questions or suggestions about my Privacy Policy, do not hesitate to contact me at shahabgraph@yandex.com.
This privacy policy page was created at privacypolicytemplate.net and modified/generated by App Privacy Policy Generator