📖
Help (PhoneInsights.app)
  • Welcome
  • Introduction
    • About The Project
    • Contact
  • Getting Started
    • Terms and Conditions
      • Terms of Use
      • 1 - Principal points
      • 2 - Subscription
      • 3 - Software application
      • 4 - Acceptance
      • 5 - Security
      • 6 - Requirements for a user
      • 7 - Compatibility of the target device
      • 8 - Software Updates
      • 9 - Free Trials
      • 10 - Refunds and Returns
      • 🔨11 - Links
      • 🔨12 - Intellectual Property
      • 🔨13 - Locations
      • 🔨14 - DISCLAIMER OF WARRANTIES
      • 🔨15 - LIMITATION OF LIABILITY; SOLE AND EXCLUSIVE REMEDY
      • 16 - Indemnification
      • 18 - Assignments
      • 19 - Severability
      • 20 - Attorneys' Fees
      • 21 - No Waiver
      • 22 - Notices
    • Privacy
    • Concepts
      • Target User
      • Target Device
      • Mobile apps
        • Target App
        • Viewer App
      • Websites
        • cPanel Website
      • Package
      • Licence Key
      • Remove application
      • Device Management
        • Mobile features
        • cPanel features
  • Features
    • Overview
    • GPS Location Insights
      • Real-time location tracking
      • Geo-Fencing
      • Hide Location Service Indicator
      • GPS Privacy Policy
    • Phone Contact Insights
      • Explain more
      • Contact policy
    • Phone Call History Insights
      • (Example User Consent Prompt (In-App))
    • Phone Call Recording Insights
      • Phone Call Recording is allowed?
      • Alternatives to Call Recording (Safer & Legal)
      • If You Want Call Recording (with Consent)
      • (Legal Consent Template for Call Monitoring (No Recording))
    • SMS Insights
      • Catch deleted messages
      • Real-Time Capture Flow Example
      • (Example Consent Clause (Privacy Policy))
    • URL Browser Insights
    • Notification Center Insights
    • Phone File Insights
    • Photo
    • Calendar
    • Ambient Voice Recording (Surrounding) Insights
    • Remote Data Wipe
  • Keylogger Insights
  • Clipboard Insights
  • Usage Limits
  • Other features
    • Show/hide app icon
    • Auto upgrade & updates
  • references
    • Dictionary & Glossary
    • Apps
    • Links
Powered by GitBook
On this page
Export as PDF
  1. Getting Started
  2. Terms and Conditions

5 - Security

  1. The software cares about the integrity and security of your personal information.

  2. Please let me know if you provide your personal information to the Payment Provider while placing the order for the Product.

  3. The software receives a user's personal information from the Payment Provider in the volume of the user’s ID and email (login); a password is known only to a user.

  4. The software stores the data in its database in an encrypted way, which means it does not have direct access to such encrypted data. However, the software is not responsible for third-party memory leaks in databases.

  5. You agree that you must retain the private encryption key provided to you by the software.

  6. The software does not collect downloaded logs and data from a target device using the Software in case of an active account older than 3 (three) months. The software does not collect downloaded logs and data from a target device using the Software in case of an expired account older than 1 (one) month.

  7. The software does not store in its database all logs and data downloaded from a target device with the Software in case of an active account for more than 3 (three) months. Upon the expiry of this period, all information gets deleted. In the case of expired accounts, all logs and data downloaded from a target device using the Software get deleted within 1 (one) month.

  8. In disclosing such encrypted data, the software may not be held responsible.

  9. The Software does not control, monitor, or know the purpose for which a user exploits it. The software may not be held responsible for such use, which is at the user’s risk and responsibility.

  10. You acknowledge that the software does not encourage users to exploit the software service illegally.

Previous4 - AcceptanceNext6 - Requirements for a user

Last updated 2 months ago