By using Callinfo, you agree to these Terms and understand that they form a legally binding agreement between you and Callinfo. If you have any questions regarding these Terms, please contact us at [info@cubixtechnology.co.uk]. write the privacy policy of my website Callinfo
1.1. We ask for permissions only when necessary: The world of communication is getting more complex day by day. At Call Info , we are committed to making communication safer, smarter, and more efficient. We want to make sure that you fully understand the permissions we need to make Call Info function how you want. You can choose to provide a few optional permissions (such as location, camera, and microphone) depending on the features you intend to use. Also, you can deactivate these permissions in the app or on your device anytime. Read more about this in the permissions section.
1.2. We upload User Contact at our server to make service batter: We upload User Contact at our server to make service batter with user permission. and we notify to user to update the contact at the server at the start of App start and before the update we alerts user to give permission.
1.3. We do not sell phone numbers:Building a leading global platform for verifying contacts and blocking unwanted communications also means that we are responsible for keeping your data safe. We do not sell our users’ names or phone numbers to third parties. In order to maintain our freemium subscription service, we collaborate with advertising partners but would never sell your personal data.
1.4. We’re committed to complying with applicable data protection laws Call Info is a truly global company and consequently subject to many different data protection regulations in the countries where we are present. We closely track the data privacy regulations to make sure that we proactively adopt good practices and are ready to comply with them. We also allocate significant resources to take the necessary steps to remain compliant.
2.1. Ownership: Users can edit their profile in the application at any time, access the personal information associated with their account, rectify it if it is inaccurate or incomplete, or deactivate their account via our Privacy Centre. We have also built a data portability feature that allows users to download a copy of all their information in a readable digital format. We have a dedicated team to address any questions or complaints related to our application or the processing of personal information.
2.2. Privacy by Design and Default We seek implications at an early stage in ideation, and embed privacy into the design and architecture of IT systems and business practices. Privacy is integral to the system and all components of Call Info are proactive in looking at the privacy implications of any new features. We seek to deliver the maximum degree of privacy by ensuring that personal data is automatically protected in any given IT system or business practice and that no action is required on the part of the individual to protect their privacy — it is built into the system, by default. For example, when users register, by default the profile details are private to users who search by name. Users cannot access the phone number by looking up a name unless a user approves this contact request. This enables us to show data in a way that is compliant, ethical, and trusted. It is also easy to un-list if a person does not want their information to be on Call Info unless identified as a spammer.
3.1. Data security: We have stringent measures in place and a strong DNA in the company to do what is best for our users. Call Info data is safe and has the highest levels of protection. All software developed to operate its core services has been developed in-house primarily using open-source technologies. We protect our assets against unintentional or unauthorized access, alteration or destruction during storage, transmission, and dissemination. For example, All data we hold is encrypted at rest and we maintain strong encryption methods to avoid and reduce the surface of any attacks. We encrypt communication when transmitting data via Transport Layer Security (TLS).