Legal Phone Parental Control Apps
  • Welcome
  • GET STARTED
    • 🧒About Legal Phone Parental Control Apps (PCA)
      • What & Why?
      • The purposes
        • The Purpose #1: Protect your child
        • The purpose #2: Employee monitoring
      • DISCLAIMER
      • Contact Info
    • 👮Terms and Conditions
      • Terms of Use
      • 1 - Principal Points
      • 2 - Subscription
      • 3 - Software application
      • 4 - Acceptance
      • 5 - Security
      • 6 - Requirements for a user
      • 7 - Compatibility of the target device
      • 8 - Software Updates
      • 9 - Free Trials
      • 10 - Refunds and Returns
      • 11 - Links
      • 12 - Intellectual Property
      • 13 - Locations
      • 14 - DISCLAIMER OF WARRANTIES
      • 15 - LIMITATION OF LIABILITY; SOLE AND EXCLUSIVE REMEDY
      • 16 - Indemnification
      • 17 - Affiliate Partners
      • 18 - Assignment
      • 19 - Severability
      • 20 - Attorneys' Fees
      • 21 - No Waiver
      • 22 - Notices
      • 23 - Entire Agreement
      • 24 - Termination of Service
      • 25 - Governing Law
      • 26 - LEGAL EFFECT
    • 🎊Concepts
      • Target user
      • Target device
      • Target app
      • cPanel website
      • Viewer app
      • Features
      • Package
      • License key
      • Coupon or Discount
      • What is the monitoring phone number?
    • 🅰️Starting from A to Z
      • 1 - Preparations
      • 2 - Installation
      • 3 - View the data
      • 4 - Activate a license
      • 5 - Remove/terminate the service
    • 🪶Features & Functions
      • 🛂0 - Built-in features
        • 🈸Show/hide icon of the app
        • Auto Upgrade
      • 🎊I - Standard features supported
        • 1 - GPS Location
        • 2 - Contact
        • 3 - Phone Call History
        • 4 - SMS Messages
        • 5 - Monitor Internet Activity
      • 🎊II - Advanced features
        • ®️Requirements
          • 📳Root an Android/ jailbreak an iOS, and Why?
          • 🤖What features need to be rooted/jailbroken?
        • 📼6 - Audible recording
          • 📞Audible phone call recording
          • 🔊Ambient voice recording
      • 🚧100 - Built-in features
        • 100.1 - Backup & Reports
        • 100.2 - Wipe data
  • FAQs
    • How to hide the icon of app?
  • FORUM
  • TECHNIQUES
    • Essential settings (required)
      • Android
        • Root the Android device
      • iOS
        • Jailbreak the iOS device
    • Troubleshooting
    • Known Issues/Bugs and Restrictions
    • Knowledge bases
    • How to, Tricks and Tips
  • REFERENCES
    • Top apps
    • Sponsors
  • ABOUT US
Powered by GitBook
On this page
  1. GET STARTED
  2. Terms and Conditions

5 - Security

  1. The software cares about the integrity and security of your personal information.

  2. Please let me know that you provide your personal information to the Payment Provider while placing the order for the Product.

  3. The software receives the personal information of a user from the Payment Provider in the volume of the user’s ID and email (login); a password is known only to a user.

  4. The software stores in its database your personal information in an encrypted way, which means the software does not have direct access to such encrypted data. However, The software is not responsible for any third-party memory leak in databases.

  5. You agree that you must retain the private encryption key provided to you by the software.

  6. The software stores the user’s login in the database. The user’s password is not stored. We store only the hash of the password generated by the md5 hash function from the user’s passwords.

  7. The software does not collect downloaded logs and data from a target device using the Software in case of an active account older than 3 (three) months. The software does not collect downloaded logs and data from a target device using the Software in case of an expired account older than 1 (one) month.

  8. The software does not store in its database all logs and data downloaded from a target device with the Software in case of an active account for more than 3 (three) months. Upon the expiry of this period, all information gets deleted. In the case of expired accounts, all logs and data downloaded from a target device using the Software get deleted within 1 (one) a month.

  9. In disclosing such encrypted data, the software may not be held responsible.

  10. The software does not control, monitor, and/or is not aware of the purpose a user exploits the Software application, and the software may not be held responsible for such use. It is at the user’s risk and responsibility.

  11. You acknowledge that the software does not encourage users to exploit the software service illegally.

Previous4 - AcceptanceNext6 - Requirements for a user

Last updated 1 year ago

👮