Your data belongs to you, and TinjaSoft apps respect that. Some TinjaSoft apps need to use personal information for normal expected behavior (logging in) and anonymous device information for advertising. But this usage is restricted to what would be required for any similar app.
In particular, TinjaSoft and its software does not knowingly do any of the following:
- Send your account information to TinjaSoft or any 3rd party.
- Collect user passwords from the Android system (instead authentication is handled using session tokens).
- Share email addresses or messages received by email@example.com.
- Interact with credit card information (credit cards are handled entirely by Google and Android system software, and is never shared with TinjaSoft).
- Use personal data in ways other than those explained in the app description or on tinjasoft.com.
- Collect precise location (GPS) data from your device.
Some TinjaSoft apps may do the following:
- Send anonymous device information including coarse location (region) data to 3rd party advertising networks.
- Receive and display advertising data from 3rd party advertising networks.
Only apps that feature ads will send information to advertising networks.
Basically, TinjaSoft doesn't do anything tricky or underhanded or illegal, and never will. Your data belongs to you alone. It is never shared with TinjaSoft or 3rd parties without your knowledge. If any defects are discovered that negatively impact security, TinjaSoft will try to fix the issue as soon as possible.
If you contact TinjaSoft for support, questions, or comments, we will not share your information with any 3rd parties without first notifying you, and only if it's necessary to help fulfill your request (which is very rare).
When you send TinjaSoft the Debug Logs from GTO, no personal data or task data is intentionally included in these logs. The logs primarily show any errors that occurred while running the app, as well as information on the version of Android (SDK version number) on your device, and the version of GTO that is currently installed on your device. Before sending the logs to TinjaSoft, you can and should review the debug log email and remove any data you don't want to share with TinjaSoft.
TinjaSoft takes privacy and security very seriously, and is very open to discussing them. If you have questions about how a particular app handles security, feel free to email firstname.lastname@example.org, and we'll do our best to explain it (the answer might get technical, but it will be accurate).
About Account Security
There has been some concern about certain Android apps transmitting user login information in an unencrypted format. This is not true for GTO or any TinjaSoft apps. GTO has always, and will always, communicate securely with Google servers using SSL encryption, via the HTTPS protocol.
Additionally, the authentication token used in Google Tasks is unique to the Tasks product alone. Having access to the Tasks authtoken does not allow access to GMail or any other Google services.
Read more about GTO security on the GTO Help page.
What information do the Applications obtain and how is it used?
User Provided Information
The Applications obtain the information you provide when you download and use the Applications.
When you use the Applications, you generally provide (a) your user name and password; (b) information you provide us when you contact us for help.
We may also use the information you provided us to contact your from time to time to provide you with important information and required notices.
Automatically Collected Information
In addition, the Applications may collect certain information automatically, including, but not limited to, the type of mobile device you use, your mobile devices unique device ID, the IP address of your mobile device, your mobile operating system, the coarse location of your device, and information about the way you use the Applications.
Does the Application collect precise real-time location information of the device?
These Applications do not collect precise real-time information about the location of your mobile device.
Do third parties see and/or have access to information obtained by the Applications?
Yes. We will share your information with third parties only in the ways that are described in this privacy statement.
We may disclose User Provided and Automatically Collected Information:
as required by law, such as to comply with a subpoena, or similar legal process;
when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request;
to advertisers and third party advertising networks and analytics companies as described in the section below.
with our trusted services providers who work on our behalf.
if TinjaSoft is involved in a merger, acquisition, or sale of all or a portion of its assets, you will be notified via a prominent notice on our Web site of any change in ownership or uses of this information, as well as any choices you may have regarding this information.
Automatic Data Collection and Advertising
We work with advertisers and third party advertising networks, who need to know how you interact with advertising provided in the Applications which helps us keep the cost of the Applications low or free. Advertisers and advertising networks use some of the information collected by the Applications, including, but not limited to, the unique identification ID of your mobile device, and the coarse location of your mobile device. To protect the anonymity of this information, we use an encryption technology to help ensure that these third parties can’t identify you personally.
If you’d like to opt-out from third party use of this type of information to help serve targeted advertising, please visit the section entitled “Opt-out” below.
What are my opt-out rights?
There are multiple opt-out options for users of this Applications:
Opt-out of all information collection by uninstalling the Applications: You can stop all collection of information by the Applications easily by uninstalling the Applications. You may use the standard uninstall processes as may be available as part of your mobile device or via the mobile application marketplace or network.
Data Retention Policy, Managing Your Information
We do not retain Automatically Collected information. We do not retain User Provided data that you have provided via the Applications. We will retain User Provided data that you have provided via email until you contact us and request that we delete it. If you’d like us to delete User Provided Data that you have provided via email, please contact us at email@example.com and we will respond in a reasonable time.
We do not use the Applications to knowingly solicit data from or market to children under the age of 13. If a parent or guardian becomes aware that his or her child has provided us with information without their consent, he or she should contact us at firstname.lastname@example.org. We will delete such information from our files within a reasonable time.
We are concerned about safeguarding the confidentiality of your information. We provide physical, electronic, and procedural safeguards to protect information we process and maintain. For example, we limit access to this information to authorized employees who need to know that information in order to operate, develop or improve our Application. Please be aware that, although we endeavor provide reasonable security for information we process and maintain, no security system can prevent all potential security breaches.
If you have any questions regarding privacy while using the Application, or have questions about our practices, please contact us via email at email@example.com.