Below we explain how we collect and use data about you.
We differentiate personal and non-personal data. Personal data is information that can be used to identify an individual. Non-personal data is information that cannot be used just by itself to identify an individual.
We do not share your data with anyone except for the data processors listed below, and to comply with the law or to protect our rights.
Here is the list of personal and non-personal data that we process and/or collect, who is actually collecting it, why it is collected, how it is used, and who it is shared with.
Contractual Information (personal data): for users who purchase our apps directly through Apple (App Store, Mac App Store, Volume Purchase Program), we do not collect and do not have access to your customer data (Apple manages it directly). Data Processor: Apple.
User-Generated Content (personal data): we do not collect user-generated content. Our apps may access, process, update your local/cloud storage data on your behalf. No sharing of personal data is performed without user consent other than through specific user-initiated actions. Your data can be accessed/exported either directly from our apps, or directly with the service provider. Data Processors: Apple.
Website Statistics (non-personal data): we use Google Analytics to analyse our website, you can opt-out of analytics by using the “Do not track” feature of browsers or by using a content blocker. Data Processors: Google Analytics.
Support Mails (personal data): we provide support by email. Users can contact us through our support email addresses to request support about our apps. Data Processors: Mailgun, SendGrid, Google.
Email Address (personal data): email addresses, as part of Contractual Information and Support Mails, are detailed above. Users accepting to beta-test our software are added to beta-testing lists that we maintain on Apple’s App Store Connect platform. Data Processors: Apple.
While no online service is 100% secure, we work very hard to protect information about you against unauthorized access, use, alteration, or destruction, and take reasonable measures to do so, such as monitoring our Services for potential vulnerabilities and attacks.