Effective as of July 1, 2018
1.INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes your email, name, date of birth, age, gender, ethnicity, height, weight, waist circumference, marital status, education, occupation, employment status, partner name, contact information (telephone number, address), which you submit to us through the registration process.
1.1 Information collected via Technology
1.2 Information you provide us by registering for an account
1.3 Information provided by third-party applications and devices
The app does use third party services that may collect information used to identify you.
1.4 Log Data
We want to inform you that whenever you use our Service, in a case of an error in the app we collect data and information (through third party products) on your phone called Log Data. This Log Data may include information such as your device Internet Protocol (“IP”) address, device name, operating system version, the configuration of the app when utilizing our Service, the time and date of your use of the Service, and other statistics.
Cookies are files with a small amount of data that are commonly used as anonymous unique identifiers. These are sent to your browser from the websites that you visit and are stored on your device’s internal memory.
This Service does not use these “cookies” explicitly. However, the app may use third party code and libraries that use “cookies” to collect information and improve their services. You have the option to either accept or refuse these cookies and know when a cookie is being sent to your device. If you choose to refuse our cookies, you may not be able to use some portions of this Service.
1.6 Service Providers
We may employ third-party companies and individuals due to the following reasons:
To facilitate our Service;
To provide the Service on our behalf;
To perform Service-related services; or
To assist us in analyzing how our Service is used.
We want to inform users of this Service that these third parties have access to your Personal Information. The reason is to perform the tasks assigned to them on our behalf. However, they are obligated not to disclose or use the information for any other purpose.
1.7 Children’s Privacy
The Platform and the Service are not directed to anyone under the age of 18. The Platform does not knowingly collect or solicit information from anyone under the age of 18, or allow anyone under the age of 18 to sign up for the Service. In the event that we learn that we have gathered personal information from anyone under the age of 18 without the consent of a parent or guardian, we will delete that information as soon as possible. If you believe we have collected such information, please contact us at email@example.com.
2. HOW WE USE AND SHARE INFORMATION
2.1 Personal Information
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to design a customized weight management plan, contact users in response to questions, solicit feedback from users, provide technical support, and inform users about promotional offers.
2.2 Non-Personal Information
3. HOW WE PROTECT INFORMATION
We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your Personal Information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
4. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
5. LINKS TO OTHER WEBSITES
7. DEVICE PERMISIONS FOR PERSONAL DATA ACCESS
Depending on the User’s specific device, this Application may request certain permissions that allow it to access the User’s device Data as described below.
By default, these permissions must be granted by the User before the respective information can be accessed. Once the permission has been given, it can be revoked by the User at any time. In order to revoke these permissions, Users may refer to the device settings or contact the Owner for support at the contact details provided in the present document.
The exact procedure for controlling app permissions may be dependent on the User’s device and software.
Please note that the revoking of such permissions might impact the proper functioning of this Application.
If User grants any of the permissions listed below, the respective Personal Data may be processed (i.e accessed to, modified or removed) by this Application.
Approximate location permission
Used for accessing the User’s approximate device location. This Application may collect, use, and share User location Data in order to provide location-based services.
The geographic location of the User is determined in a manner that isn’t continuous. This means that it is impossible for this Application to derive the approximate position of the User on a continuous basis.
Used for accessing the camera or capturing images and video from the device.
Used for accessing and recording microphone audio from the User’s device.
Motion sensors permission
Used for accessing the User’s device motion sensors to measure the User’s activity such as step counts, stairs climbed, and movement type (walking, cycling, etc.).
Used for accessing a host of typical features associated with telephony. This enables, for instance, read-only access to the “phone state”, which means it enables access to the phone number of the device, current mobile network information, or the status of any ongoing calls.
8. CONTACT US