What information does the Application obtain and how is it used?
The Application requires access to the contacts list in order to provide the user a selection of recipient email addresses when composing a message. The contacts list is only used for this purpose and will only be used by the Application itself. If the compose email functionality is not required or if the end-user does not need the auto-fill email address functionality, the contacts permission can be disabled. The Application will still function without the contacts permission. The Application does not collect any other information.
User Provided Information
The Application does not require the user to register. During the setup of the Application, the Application wizard asks the end-user to configure the SMTP connector and generate a certificate. If the compose functionality is not required or if a self generated certificate is not required, setting up the SMTP connector and/or certificate can be skipped.
Does the Application collect precise real time location information of the device?
This Application does not collect any information about the location of your mobile device.
If you have any questions regarding privacy while using the Application, or have questions about our practices, please contact us via email at email@example.com.
DISCLAIMER OF WARRANTY
The Software is provided on an AS IS basis, without warranty of any kind, including without limitation the warranties of merchantability, fitness for a particular purpose and non-infringement. The entire risk as to the quality and performance of the Software is borne by you. Should the Software prove defective, you and not CipherMail assume the entire cost of any service and repair.
CipherMail IS NOT RESPONSIBLE FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES.
Title, ownership rights and intellectual property rights in and to the Software shall remain in CipherMail. The Software is protected by international copyright treaties.
NOTE THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME PARTS OF THE WORLD. IT'S YOUR RESPONSIBILITY TO MAKE SURE YOU ARE ALLOWED TO USE STRONG CRYPTOGRAPHY. THE AUTHORS OF DJIGZO ARE NOT RESPONSIBLE FOR ANY VIOLATIONS YOU MAKE.