- Information We Collect
- How We Use Information
- How We Share Information
- How We Store Your Data
- Control over Your Data
- Information Security
- Contact Us
Information We Collect
There are three basic categories of information we collect:
- Information you choose to give us.
- Information we get when you use our services.
- Information we get from third parties.
Here’s a little more detail on each of these categories.
Information You Choose to Give Us
When you interact with our services, we collect the information that you choose to share with us. For example, we require you to set up a basic account, so we need to collect a few important details about you, such as: a unique username you would set, a password, an email address and a phone number.
When you contact Choriotis Support or communicate with us in any other way, we will collect whatever information you give us.
Information we get from your use of our services
We collect information about the services that you use and how you use them.
We collect device-specific information (such as your hardware model, operating system version, language, and unique device identifiers).
When you use our services, we automatically collect and store certain information in server logs. This includes:
- Internet Protocol address.
- Details of how you used our service, including access times.
- Locale preferences.
- Device and application event information such as crashes and errors generated.
- Numbers that may uniquely identify your account.
We may collect and store information (including your preferences) locally on your device.
Information we get from third parties
Technologies such as: cookies, beacons, tags and scripts are used by Choriotis and our partners, affiliates, or service providers (such as subscriptions and analytics service providers). These technologies are used in analyzing trends, administering our services, and to gather demographic information about our user base as a whole. We may receive reports based on the use of these technologies by these companies on an individual as well as aggregated basis. We may also obtain information from other companies that are operated by us, or any other third-party sources, and combine that with the information we collect through our services.
How We Use Information
We use the information we collect to provide you with an amazing set of features and services that we constantly improve. We also use this information to manage, maintain and protect them, to develop new services, and to protect our users. This includes:
- Monitoring and analysis of trends and usage.
- Enhancing the safety and security of our products and services.
- Preventing fraud or other unauthorized or illegal activity.
- Communicating with you.
How We Share Information
We may share information about you as follows:
With our Affiliates
We may share information with affiliated businesses we do not control. This can be the case if you have been redirected from those businesses to our services or products so as to give them credit.
With Third Parties
With Service Providers and Partners
We may share information about you with other companies and individuals that we employ to perform functions on our behalf. These are service providers and business partners that provide services and functionality.
For Legal Reasons
We may share personal information about you with companies, organizations or individuals if we reasonably believe that disclosing the information is necessary to:
- Meet any applicable law, regulation, valid legal process or governmental request.
- Detect, prevent, resolve, or otherwise address any fraud, security or technical concerns.
- Protect against harm to the rights, property or safety of us, our users or others as required or permitted by law.
How We Store Your Data
Your data collected through the Service may be stored and processed in Europe, North America or any other continent in which Choriotis, its Affiliates or Service Providers maintain facilities.
Choriotis, its Affiliates, or Service Providers may transfer your data, including your personal information across borders and from your country or jurisdiction to other countries or jurisdictions around the world, which may not have the same data protection laws as your jurisdiction.
Control over Your Data
Access and Updates
You have the right to access your personal information. If you notice that some information is wrong or inaccurate, Choriotis strives to give you ways to quickly correct, amend or delete it.
We do our best to gain your satisfaction. However, if you ever want to leave our services, you can delete your account at any time you want. In this case, and for your best of your interest, you should make a copy of all the data you need using the available means provided by the Service. For instance, you may export all of your contacts using the vCard file format.
If you ask to delete your account, you will have up to 19 days to restore your account. After this time, your data will be deleted from our servers (including any backup copy). Please note that this process is irreversible and your data will be permanently lost. You also have the possibility to delete all your data before the aforementioned period by getting in touch with our customer service. Such customized requests may take up to 48 hours (during working days) to take effect.
We work to protect the security of your data during transmission by using Secure Sockets Layer (SSL) software, which encrypts information you input. We also work to protect data we hold from unauthorized access, unauthorized alteration, disclosure or destruction. Of course, it is important for you to protect against unauthorized access to your password and to your computer.
Each time you log in using your password, the service provides you with a unique access token which is stored in your local device. This token is implicitly used to identify and authenticate you when you access your account data. It is also used the next time you open the application. If you have installed the application in a device which is not yours, make sure to log out when finished using the service so as to revoke and destroy the aforementioned access token.