Own Effect Apps Privacy Policy
Privacy Policy
Last updated: 17th August 2021
This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally identifiable information’ (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
WHAT PERSONAL INFORMATION DO WE COLLECT FROM THE PEOPLE THAT VISIT OUR BLOG, WEBSITE, OR APP?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, or other details to help you with your experience.
WHEN DO WE COLLECT INFORMATION?
We collect information from you when you register on our site, fill out a form or enter information on our site.
HOW DO WE USE YOUR INFORMATION?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
• To allow us to better service you in responding to your customer service requests.
• To send periodic emails regarding your order or other products and services.
HOW DO WE PROTECT VISITOR INFORMATION?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
WE USE REGULAR MALWARE SCANNING
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology. We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information. All transactions are processed through a gateway provider and are not stored or processed on our servers.
DO WE USE COOKIES?
We do not use cookies for tracking purposes. You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser’s Help menu to learn how to modify your cookies. If you disable cookies, some features will be disabled that make your site experience more efficient and some of our services will not function properly. However, you can still place orders.
THIRD-PARTY DISCLOSURE
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.
THIRD-PARTY LINKS
We do not include or offer third-party products or services on our website.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adspolicy/answer/6008942
WE USE GOOGLE ADSENSE ADVERTISING ON OUR WEBSITE
Google, as a third-party vendor, uses cookies to serve ads on our site. Google’s use of the DART cookie enables it to serve ads to our users based on their visits to our site and other sites on the Internet. Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy.
We have implemented the following:
• Remarketing with Google AdSense
• Demographics and Interests Reporting
We along with third-party vendors, such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions, and other ad service functions as they relate to our website.
OPTING OUT
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt-out by visiting the Network Advertising initiative opt-out page or permanently using the Google Analytics Opt Out Browser add-on.
COPPA (CHILDREN ONLINE PRIVACY PROTECTION ACT)
When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online. We do not specifically market to children under 13.
FAIR INFORMATION PRACTICES
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email
• Within 1 business day
We will notify the users via in-site notification
• Within 1 business day
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
How do we use your information?1. ACCESS_NETWORK_STATE:
Some of our applications may use this permission to access information about networks. In our apps, we will just give you information about the network, such as whether you are connected to a network or not. We don’t collect and share information with others.
2. ACCESS_COARSE_LOCATION
Some of our applications may use this permission to access approximate locations derived from network location sources such as cell towers and Wi-Fi. This information is untraceable. We don’t collect and share location information with others.
3. ACCESS_FINE_LOCATION
Some of our applications may use this permission to access precise locations derived from the network locations. This information is untraceable. We don’t collect and share location information with others.
4. WRITE_EXTERNAL_STORAGE and READ_EXTERNAL_STORAGE
Some of our applications may use these permissions to access Media files from USB storage. We don’t collect, store or share information.
5. INTERNET:
Some of our applications may use this permission to open network sockets. In our apps, we are using INTERNET permission to use the internet only. We don’t collect or transfer network information.
6. READ_PHONE_STATE
Some of our applications may use this permission to access phone state, including the phone number of the device, current cellular network information, the status of any ongoing calls, and a list of any phone Accounts registered on the device. We don’t collect, store or share any information.
7. CALL_PHONE
Some of our applications may use this permission to initiate a phone call without going through the Dialer to check the USSD codes. We do not collect or share this information.
8. READ_CONTACTS
Some of our applications may use this permission to read your contact information when you request. We do not collect or share this information. We use this permission to announce caller names or to display dialed/received calls / missed calls when you request.
9. READ_GSERVICES
Some of our applications may use (parts of) the Google Services Framework, it must declare the READ_GSERVICES permission. This information is untraceable.
10. VIBRATE
Some of our applications may use this permission to know vibration and change vibration states when the user needs it.
11. WAKE_LOCK
Some of our applications may use this permission to access Power Manager Wake Locks to keep the processor from sleeping or the screen from dimming. When the user wants to display a digital clock on the screen.
12. RECEIVE_BOOT_COMPLETED
Some of our applications may use this permission to allow alarms, Background services, etc,. After booting has been completed.
13. SET_ALARM
Some of our applications may use this permission to access alarms from devices and sets.
14. SEND_SMS, READ_SMS, RECEIVE_SMS
Some of our applications may use these permissions to read, send or receive SMS from the device. We don’t collect, save or share your messages. This is highly securable.
15. SET_WALLPAPER
Some of our applications may use this permission to set selected images as wallpaper.
16. SET_WALLPAPER_HINTS
Some of our applications may use this permission to adjust and resize selected wallpaper sizes.
17. ACCESS_WIFI_STATE
Some of our applications may use this permission to access information about Wi-Fi networks. We don’t collect or share any information about Wi-Fi.
18. CHANGE_WIFI_STATE
Some of our applications may use this permission to change the Wi-Fi connectivity state (WIFI ON / WIFI OFF) when you request.
19. BLUETOOTH
Some of our applications may use this permission to connect the paired Bluetooth devices when you request.
20. BLUETOOTH_ADMIN
Some of our applications may use this permission to discover and pair Bluetooth devices.
21. BLUETOOTH_PRIVILEGED
Some of our applications may use this permission to pair Bluetooth devices without user interaction and to allow or disallow phonebook access or message access. We don’t save or share information.
22. WRITE_SECURE_SETTINGS
Some of our applications may use this permission to access device security settings. We don’t collect or share information.
23. WRITE_SETTINGS
Some of our applications may use this permission to switch or adjust system settings such as ringtone, vibration and brightness of the screen, etc. when you request.
24. CAMERA
Some of our applications may use this permission to take photos/videos and turn ON/OFF Camera Flash when you request. We do not save or upload your photos/videos.
25. FLASHLIGHT
Some of our applications may use this permission to turn ON/OFF Camera Flash. we use this permission for taking photos, flashlight on alert services, or flashlight on clap services.
26. DISABLE_KEYGUARD
Some of our applications may use this permission to access our application functionality after the screen is turned off.
27. RECORD_AUDIO
Some of our applications may use this permission to record an audio sound when you request. We don’t collect or share the information.
28. MODIFY_AUDIO_SETTINGS
Some of our applications may use this permission to modify global audio settings as your request.
29. BATTERY_STATS
Some of our applications may use this permission to access battery information such as battery percentage, capacity etc., to display battery performance.
30. GET_ACCOUNTS
Some of our applications may use this permission to detect whether users have a Google account or not, to confirm the state of Google Services, provide users with particular application download or update methods. We don’t share or save your account information in any manner. It is highly securable.
31. SYSTEM_ALERT_WINDOW
Some of our applications may use this permission to create windows and may show on top of other applications.
32. READ_CALENDAR
Some of our applications may use this permission to read CALENDER info. We don’t share and save this information.
33. READ_CALL_LOG and WRITE_CALL_LOG
Some of our applications may use these permissions to display call logs from devices. We don’t collect, save or share your call information. This is highly securable.
34. CLEAR_APP_CACHE
Some of our applications may use this permission to clear all the caches from all installed applications when you request.
35. KILL_BACKGROUND_PROCESSES
Some of our applications may use this permission to clear all the background processes from your device when you request.
36. GET_PACKAGE_SIZE
Some of our applications may use this permission to find out the space of used applications So, you can manage mobile space.
37. MOUNT_UNMOUNT_FILESYSTEMS
Some of our applications may use this permission to insert and remove file systems for external storage.
38. READ_SYNC_SETTINGS and WRITE_SYNC_SETTINGS
Some of our applications may use these permissions to allow SYNC settings for battery power saving.
39. RESTART_PACKAGES
Some of our applications may use this permission to kill Background Processes. It allows them to break other applications by removing their alarms, stopping their services, etc. We use these permissions to improve mobile performance when the user requests.
40. REAL_GET_TASKS, GET_TASKS
Some of our applications may use these permissions to get tasks. We don’t collect, save or share your task information.
What permission ask for and why:
ACCESSIBILITY SERVICE
The app requires accessibility permission to log camera, location, and microphone usage. This is done to avoid having unauthorized access to the camera, location, and microphone for privacy. You'll be required to enable the Accessibility permission in the app so the app can work as intended. All the data collected by the Accessibility service will be stored on your device and will be erased when the app is removed or data is cleared.
LOCATION ACCESS
To get the location app usage. The App itself does not request camera or microphone access, however, to be able to monitor GPS access by any App, The app requires GPS location permission.
CAN SPAM ACT
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
CONTACTING US
If there are any questions regarding this privacy policy you may contact us here