This Privacy Statement describe
our privacy practices and provide general information about how and why we
collect and use your personal information when you use our mobile application.
This Privacy statement applies to all personal and
professional data we collect to grant you access to application and data
related to usage of the application.
Information we may collect to give you user
account usable for access to the application:
·
Mandatory
information for creating user account consists of:
o
First
name
o
Surname
o
Email
address
·
We
may also collect following information:
o
Office
location
o
Working
position
o
Company
name
Information we may collect while you using the
application:
·
Location
·
Date
and time
·
Locally
stored pictures from your mobile device – based on user request
Mandatory data for creating the user accounts
mentioned in previous article are used for authorization of your access to
application and related services. Other collected data are stored as part of
the main features of the application – managed picture storage.
We also may use collected data for following
purposes:
·
Provide
and operate the application
·
Analyze
the usage of app
·
Send
alerts and notifications
·
Investigate
and prevent fraudulent activities, unauthorized access and other illegal
activities
Your personal and professional data may be
shared only within the Deufol organization to collect
invoicing data. There is no sharing of the data with 3rd party
organizations.
We have a dedicated team maintaining the
technical environment based on best technological, administrative and
organizational practices to protect your data. All the data are stored on Deufol owned or Deufol operated
servers.
When you get your user credentials to access
the application you became responsible for keeping your password confidential.
We ask you not to share your password with anyone.
We do our best to protect your personal and
professional data but we cannot guarantee the security of the data
transmission. Any transmission is at your own risk. Once we received the data
we use strict security features described above.