1.2 The company reserves the right to make changes to Applications and, if necessary, to adapt the real Policy to the made changes.
2. Purposes of data processing of users by the company
2.1 The company collects data of technical character on use of Applications and about the arising mistakes for the purpose of creation of statistics of use of Applications for the subsequent their improvement and elimination of mistakes.
2.2 The company can collect personal user information of Applications (the user's e-mail) for the purpose of automatic single sending electronic calculation (service) on the e-mail address of the user upon the demand of the user.
3. Data of users which are collected and processed by the company
3.1. Personal data: the user's e-mail (single sending service upon the demand of the user). The company doesn't collect and doesn't process other personal data of users of applications which are entered in Applications by users.
3.2. Specifications which are collected by the Company: data on the number of applications launches in general and their separate screens and functions, number of active users, country and region of use of Applications.
3.3. Data on mistakes which are collected by the Company: the technical parameters of the device given about localization of a mistake, frequency of mistakes and failures.
3.4. All users have an opportunity to turn off providing to the Company specifications and data on mistakes through the menu of setting up Applications.
4. Data transmission of users which are collected and processed by the company, to the third parties
For implementation of collecting, processing and data storage of technical character about use of Applications and about the arising mistakes, the company can use services of the third parties (Google Analytics, Unity Analytics).
5. Data security of users
Data processing of users happens in Applications on their own devices without participation of the company.
The data security is ensured by standard means of an operating system, in Applications additional resources of protection are absent.
Users use Applications as is and independently provide protection of the data in him from threats to security, including, but without being limited:
— protect the device and Applications installed in it from theft or loss;
— protect the device and Applications installed in it from unauthorized access.
Concerning operation of applications it is possible to contact by e-mail the address [email protected].