1. Core Principles
Product Usage & Ethical aspects
From an ethical standpoint, our main purpose is to provide an effective phone investigation tool for use primarily by law enforcement, and other organizational bodies with proper authority to investigate phones. We aim to help the world fighting against crime and terrorism and our products must be used only by those with authority according to local law. We are primarily targeting our forensic product range to police and law enforcement, military, governmental agencies, expert witnesses and legal consultants, and university research programs etc. We are able to detect misuse or illegal copies of our software, and we actively block these copies when misuse is detected. Users can report misuse at email@example.com.
The end-user/purchaser is responsible for the security of the license key. An active license key is required to use our program. If the license key is not kept secure, it is at risk for theft. For this reason we have stated in our EULA that the purchaser should keep the key private and secure. If theft of license key is reported by the purchaser, we will terminate the key immediately and replace it with a new key.
2. Collection of information
When you provide information during a purchase of our products, the data is stored at our payment provider data cloud storage. Our access to this data is very limited, we do not and never have seen any information about credit cards, or other related transaction information. We only see that a purchase transaction was completed successfully. Our e-commerce partners have adopted Privacy Shield Policy to establish and maintain an adequate level of Personal Data privacy protection. This Policy applies to the processing of Personal Data that the payment processor obtains from customers. We cooperate only with historically proven world-known e-commerce partners, that adopt the utmost high-end security methods.
When you send us emails or other communications, such as customer support inquiries, we maintain those communications and their contents so that we can resolve your inquiries or otherwise assist you.
Usage Information. This includes information about your activity on and interaction with the Services, such as your IP address, your device or browser type, the webpage you visited before coming to our sites and identifiers associated with your devices. This information enables us to analyze how the Services are being accessed and used, and to track performance of the Services.
Cookies And Other Technologies. We use these technologies to do things such as remember your preferences, keep you safe and improve and promote the Services.
- MOBILedit Ads. We partner with third party publishers, advertising networks and service providers to manage our ads on other sites. Our third party partners may set cookies on your device or browser to gather information about your activities on the Services and other sites you visit, in order to provide you with MOBILedit ads. For example, if you visit MOBILedit and also use a social media platform, you may see a MOBILedit ad in your social media newsfeed or timeline.
- Opting Out. You can set your browser to not accept cookies, but this may limit your ability to use the Services.
Device Identifiers. We use device identifiers to track, analyze and improve the performance of the Services and our ads.
We’re committed to keeping your personal information safe. That’s why we minimize the information that we need in order to license you our software. In our own database we only use most necessary fields such as - the name of licensee, company name and your email – to be sure your license is stored and highly-protected for your future usage and retrieval in cases when it is misused or lost.
Using the product
After the activation of our software is made, the software is in offline mode, meaning that no information is sent anywhere. Your personal data is protected by the security of your computer, such as Windows log-on, etc. and never shared without your permission. As we are a security company, we have built in modern encryption into our products to let you share only what you want on your terms with the best protection.
We may send emails strictly to only those users who opt-in to register for a newsletter. Only relevant information about new updates, products and technologies are sent. We never provide email addresses to any other third party. Emails are infrequent with a clear opt-out option.
Regarding the database of our customers – although we are a security company and employ top security professionals, we have chosen to store customer data using a cloud data services partner, ensuring a higher-level of security than what we might currently have in place on our own local servers. To access the cloud, we use biometric or at least two-factor authorization. We also select employees. Only employees with the highest clearance have access to our data. Employee access is logged and passwords are strictly regulated. We limit access to customer data to only a select few of these employees who need such access to provide a sales support or troubleshooting on our customers' behalf.
When you use our products, we may share your information only as described below:
We may disclose your information to third parties if we determine that such disclosure is reasonably necessary to comply with the law, protect our rights or prevent fraud or abuse of MOBILedit or our users. When we receive law enforcement or national security requests for information, we strongly believe in privacy and transparency. We scrutinize such requests carefully and challenge vague, overbroad or otherwise unlawful requests. And when legally permitted, we provide our users with notice that their information is being requested. This notice is provided so that you have the opportunity to challenge such requests.
Business Transfers. If we're involved in a reorganization, merger, acquisition or sale of our assets, your information may be transferred as part of that deal.
While no service is completely secure, we have a security team dedicated to keeping your information safe. We employ security measures such as using firewalls to protect against intruders, building redundancies throughout our network (so that if one server goes down, another can cover for it) and testing for and protecting against network vulnerabilities.
We'll retain your personal information for as long as we need it to provide you with the Services. You can ask for your personal information to be deleted at any time by deleting your Account or contacting us at firstname.lastname@example.org. Please note that there may be latency in deleting your personal information from our servers and backup storage, and we may retain your personal information in order to comply with the law, protect our rights, resolve disputes or enforce our agreements.
To modify or delete the personal information you have provided to us, simply log into the Services and update your profile. We may retain certain information as required by law or for necessary business purposes. On request, we'll provide you with a copy of your personal information that we maintain. This request may be subject to a fee not exceeding the prescribed fee permitted by law.
We may periodically email you service-related announcements. We'll also send you emails related to your transactions. We may also send you marketing or promotional communications, but you can opt out of receiving subsequent marketing or promotional communications by clicking the link marked unsubscribe (or a similar phrasing) that’s included in those communications.
The user assumes all responsibility and risk for the use of this product. We accept no liability or responsibility to any person or organization as a consequence of any reliance upon the information obtained using this program. Under no circumstances, including negligence, shall anyone involved in creating or maintaining this product be liable for any direct, indirect, incidental, special or consequential damages, or loss profits that result from the use or inability to use this product Nor shall they be liable for any such damages including, but not limited to, reliance by a customer on any information obtained via this product; or that result from mistakes, omissions, interruptions, deletion of files, viruses, errors, defects, or failure of performance, communications failure, theft, destruction or unauthorized access. States or Countries which do not allow some or all of the above limitations of liability, liability shall be limited to the greatest extent allowed by law.