Last updated: (03/09/2017)
Your privacy is vital to PakLogix Apps. Sometimes we need information to provide services that you request; this privacy statement applies to PakLogix Apps and its goods.
What information we require and how we use it:
We use your Personal Information only for providing and improving the apps .
1. Device status and identification
This permission allows us to identify an incoming call and to switch between the User System interfaces and call interface.
2. Read your text messages (SMS or MMS)
We do not save or upload your messages. We use this permission to read your text messages when you search messages in search bar or declare the sender name while some one sends you a message.
3. Take pictures and videos
We use your device’s camera flashlight and require camera permission. PakLogix Apps will not take photos and videos by itself and pass it on too any third party.
4. Approximate location (network-based)
This permission is used to display apps installed by anonymous nearby users and to recommend popular apps based on users’ location in PakLogix Apps Radar. This information is untraceable.
5. Read your contacts
We do not save or upload your contacts. Permission to access contact information is used only when it required.
6. Read calendar events and private information
This information is used to remind you of your latest calendar events. We do not save or upload any of your calendar information.
7. Records accounts on the devices
PakLogix Apps does not recognize or save your account information for any programs. we only detects when users have a Google account linked with the device which helps us confirm the state of Google Service and provide users with appropriate application download and update methods.
8. Google service configuration
This information is used to acquire advertising ID. We provide users with better advertising service by using such anonymous ID.
9. Change network connectivity
This permission is used in settings and notification toolbar, in order to change network connectivity.
10. Connect and disconnect from Wi-Fi
This permission is used in settings and notification toolbar in order to connect and disconnect from Wi-Fi.
11. Full network access
This permission is used to access the device’s network for certain functions including receiving launcher update notifications.
12. View network connections
This permission is used in settings and notification toolbar, in order to view network connections.
13. Access Bluetooth settings
This permission is used in settings, in order to turn on and off the Bluetooth.
14. Close other apps
This permission is used Increase in order to turn off the back-end apps and make the phone running faster.
15. Retrieve running apps
This permission is used in Boost in order to view the running apps.
16. Draw over other apps
This permission allows us to free swipe tab to be displayed as a floating window on other apps.
17. Control vibration
This permission allows us to make the phone vibrate once after users set the device on vibrate, confirming the setting has been turned on.
18. Measure app storage space:
This permission is used to obtain the amount of storage space used by an application.
19. Adjust system settings:
This permission is used in settings, in order to switch or adjust ringtone, vibration and brightness level of the screen.
20. Find Home settings and shortcuts:
This permission is used to acquire the user’s Home settings and shortcuts, in order to uphold user partialities.
21. Device & app history:
Retrieve running apps and we use this information to boost your Android device excellently, clean your device's RAM and make your phone speed up in complexity.
How we protect your information: We have implemented commercially reasonable technical and organizational measures to protect your personal information from accidental loss and from loss, misuse and unauthorized access, disclosure, alteration and destruction. However, please note that although we take reasonable measures to protect your information, no app, website, Internet transmission, computer system or wireless connection is completely secure.