DayTicker Privacy Policy
Last Updated: February 13, 2025
Effective Date: February 13, 2025
Welcome to DayTicker. DayTicker is a product service provided by an individual developer (hereinafter referred to as "we," "our," or "us"). This Privacy Policy explains how we collect, use, share, and protect your personal information when you use our mobile application and related services (collectively, the "Services"). We understand the importance of personal information to you and will take corresponding security protection measures in accordance with legal requirements to protect your personal information security and controllability.
By accessing or using DayTicker, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy. Before you agree to this policy, we will not collect any of your privacy information. If you agree to this policy and use DayTicker, we will collect, store, use, disclose, and protect your personal information in accordance with this policy. If you do not agree with any part of this policy, please do not use our Services.
Please read and understand this policy carefully before using any of DayTicker's products or services. When you use any service provided by DayTicker, it means that you have agreed to our collection, use, and protection of your personal information in accordance with this policy. If you have any questions, comments, or suggestions regarding this policy, please contact us via email at deqiutseng@gmail.com.
This policy does not apply to services provided by other third parties to you. For example, when third parties on our platform provide services to you through our platform (such as third-party payment channels), the personal information you provide to third parties is not subject to this policy. Unless otherwise required by law, we are not responsible for any third party's use of information provided by you.
For information about third-party SDKs used in our products, please refer to the DayTicker Third-Party SDK Directory.
1. Information Collection
1.1 Information You Provide Directly
When you use DayTicker, you may voluntarily provide us with various types of information:
- Basic Services Without Registration: If you use DayTicker without registering, you can use all services.
- Storage Permissions: Registered users who use DayTicker to upload or copy related content need to authorize access to your storage information (i.e., you need to agree to modify/delete SD card content and read external storage permissions). If you have not yet authorized, we will prompt you to grant authorization through a pop-up window. After obtaining your authorization, you can upload videos, pictures, copy text, etc. in DayTicker. If not authorized, you will not be able to use related functions.
- User-Generated Content: Any content you create, upload, or share through our Services, including text, images, videos, and other media.
- Communication Data: Information you provide when contacting our customer support team, participating in surveys, or communicating with other users through our platform, including contact information and communication records with our customer service personnel.
- Invoice Information: After you register as a DayTicker account, when we provide specific services and issue and send invoices to you, we will collect your invoice delivery address, including recipient name, detailed address, postal code, mobile phone number, etc.
1.4 Automatically Collected Information
When you interact with DayTicker, we automatically collect certain technical and usage information based on the specific permissions you grant during software installation and use:
- Device Information: Device type, model, operating system type and version, screen density and resolution, unique device identifiers (such as IMEI/IDFA, MAC/IMSI/Android ID), network device hardware address, mobile carrier, and hardware specifications. We also collect device installation lists and network types.
- Location Data: With your explicit permission, we may collect approximate or precise location information (including location information obtained through GPS, WiFi signal access points, and base station sensor information) to provide location-based features.
- Usage Analytics and Log Information: How you interact with our Services, including search query content, browsing history, playback records, playback duration, features accessed, time spent, pages viewed, clicks, taps, navigation patterns, IP address, and other usage data.
- Network Information: IP address, internet service provider, network type (Wi-Fi, cellular), connection speed, WLAN information (SSID, BSSID, WLAN access points), WiFi information (WiFi name, WiFi scan results, WiFi status, nearby WiFi hotspots), and related network data.
- Log Data: Server logs containing timestamps, access times, browser type, referring URLs, error messages, and crash reports.
- Clipboard Information: When you share or receive shared information, we will access your clipboard to read passwords, share codes, links, and other content to help you conveniently share content.
- Application Information: To ensure operational security, we collect information about installed applications or running processes, application running list information, application usage and frequency, application malfunction situations, performance data, and application sources.
- Background Collection: We may collect your device information (device manufacturer, device model, operating system version, Device_ID, hardware serial number), network type, IP address, WLAN information, device identifiers (MAC address, IMEI, Android_ID, OAID, ICCID, GAID, MEID, and IMSI), WiFi information, running process information (GET_TASKS), installed application lists, and sensor information (acceleration, magnetic field, gyroscope, direction, pressure, rotation vector, light, magnetometer, angular velocity, gravity) in silent/background state to help us provide problem diagnosis and troubleshooting, ensure software and service security, or respond to you in other aspects.
- Auto-Start Behavior: To push the latest information or follow-up information to you in a timely manner, DayTicker may have a brief auto-start behavior in the background after you exit the application. If you want to turn off the auto-start function, it may cause normal reminders to fail. You can turn off the auto-start function in the device settings - applications - auto-start management.
Please note that device information, log information, etc. alone are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or combine it with personal information, during the combined use period, such non-personal information will be regarded as personal information. Except with your authorization or as otherwise provided by laws and regulations, we will anonymize and de-identify such personal information.
1.5 Information Collected Through Indirect Means
Behavioral information when you use products and services of our affiliates and partners that interact with our products and services.
When you use the above services through our products or services, you authorize us to receive, aggregate, and analyze your personal information or transaction information from our affiliated companies according to actual business and cooperation needs, which we confirm is from legal sources or that you have authorized to provide to us. We promise that we have confirmed the legality of the sources of the above personal information.
1.6 Information Collected Through Cookies and Similar Technologies
Cookies: To make your access experience easier, when you visit our platform website or use services provided by our platform, we may identify your identity through small data files to help you avoid repeatedly entering registration information, or to help determine your account security. These data files may be Cookies, Flash Cookies, or other local storage provided by your browser or associated applications (collectively referred to as "Cookies").
Please understand that some of our services can only be realized by using "Cookies." If your browser or browser additional services allow, you can modify the acceptance level of Cookies or refuse our Cookies, but this action may affect your secure access to our platform-related websites and use of services provided by our platform in some cases.
2. How We Use Your Information
We use the information we collect for the following purposes:
- Account Management: To help you become our user and use the services we provide. To create and manage your account, authenticate your identity, and process your requests.
- Service Provision: To provide, operate, maintain, and improve our Services. To provide you with various services (watching live streams, becoming a broadcaster, sending content, etc.), and to design, maintain, and improve these services.
- Personalization: To personalize your experience by tailoring content, features, and recommendations to your preferences. This includes displaying and recommending content and targeted advertising, pushing messages, specifically including recommending content you may be interested in, sending you product and service information, content recommendations, partnership information, or displaying personalized third-party promotional information through the system, or providing you with more relevant advertisements and personalized messages instead of generally delivered advertisements and messages. To provide you with personalized information search and browsing services, we will extract your browsing and search preferences and behavioral habits based on your browsing and search records, necessary device information, and location information (with your authorization), perform indirect population profiling based on feature tags, and display and push information to provide you with more relevant advertisements. You can change services through "Recommendation Settings" or by blocking topics or users.
- De-identification Processing: When we collect and use the above information, we perform de-identification processing. Data analysis only corresponds to specific codes that cannot be directly associated with user identity and cannot be associated with your real identity.
- Risk Identification: We may use your personal information to prevent, detect, and investigate fraud, security hazards, illegal activities, or violations of agreements, policies, or rules with us or our affiliates, such as abnormal account activities, multi-device login, traffic anomalies, etc., to protect you, our other users, or the legitimate rights and interests of us and our affiliates.
- Surveys and Activities: When you choose to participate in surveys, prize draws, online or offline promotional marketing activities, etc. held by us or third parties, you may need to fill in personal information such as name, communication address, and contact information in relevant forms. If you refuse to provide relevant information, it may affect your participation in related activities, but it will not affect your use of other functions. Only with your consent will we and third parties collect and process relevant information to provide you with corresponding product services. The specific personal information processing situation is subject to the content published on the activity page.
- Security Assurance: To improve the security of services provided by us and our partners, ensure a safe operating environment and identify abnormal account status, protect the personal and property safety of you or other users or the public from infringement, better prevent computer viruses, phishing websites, network attacks, and other security risks, we may use or integrate your member information, transaction information, device information, relevant network logs, and information obtained by our partners with your authorization or in accordance with the law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law. The above business scenarios 2-6 do not generate new personal information. If you believe that the above automated decision-making mechanism has a substantial adverse impact on you, you can contact us through in-app private messages or email, and we will provide intervention within a reasonable scope.
- Public Interest Maintenance: In special circumstances, we will have the right to use your personal information without your consent. Such special circumstances include: (1) directly related to national security and defense security; (2) directly related to public safety, public health, and major public interests; (3) directly related to criminal investigation, prosecution, trial, and judgment execution; (4) for maintaining your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain consent from you or other individuals; (5) personal information that you yourself disclose to the public; (6) other circumstances provided by laws and regulations.
- Legal Compliance: To comply with legal obligations, respond to legal requests, and protect our rights and the rights of our users.
- Development: To develop new features, products, and services.
- Marketing: To send you marketing communications (with your consent, where required by law).
In addition to the purposes covered by the above scenarios, if we need to use your personal information for other purposes, we will notify you through an announcement to re-obtain your express consent.
3. Shared Information and Public Information
You can publish content, establish connections, and share with each other through our services. When you publish content through our services, other DayTicker users or visitors may see your avatar, username, gender, number of likes, number of followers, and other information.
When using DayTicker for browsing, publishing content, commenting, and communicating, personal information may be disclosed. Please properly protect your personal information and only provide and display your information to others when necessary. If you find that your personal information has been leaked, especially if your account or password has been leaked, please contact our platform customer service immediately to take corresponding measures.
Public information refers to any information you publicly share, such as content you publish, comments you make, your avatar, nickname, username, etc.
Please note that the content and information you share when using our services may involve your personal sensitive information or that of others. For example, when you upload avatar images, or when you choose to upload images containing personal information when commenting, posting, or sending bullet comments. Please consider more carefully whether to share or even publicly share relevant information when using our services.
4. Information Sharing and Disclosure
We do not sell your personal information. We bear confidentiality obligations for your information. Except for the following circumstances, we will not share your personal information with any other third party.
4.1 Sharing and Disclosure
- With Your Explicit Consent or Authorization: After obtaining your authorization or explicit consent, we will share your personal information with other companies, organizations, and individuals. For example, if we entrust third parties to provide you with products or services (such as user activities, prize delivery for prize draws, point redemption prizes), we will share the above information with third parties after obtaining your consent. If you refuse to provide such information, we will not be able to complete the relevant delivery services. Only if you choose to agree will we share your personal sensitive information. With your explicit consent or based on your active choice, we may publicly disclose your personal information.
- Legal Requirements: We may share and disclose your personal information in accordance with legal provisions, litigation dispute resolution needs, or requirements put forward by administrative and judicial organs in accordance with the law. For example, if you violate laws and regulations or seriously violate our platform's relevant agreement rules, or to protect the personal and property safety of our platform website and its affiliated company users or the public from infringement, we may disclose your personal information in accordance with laws and regulations or our platform's relevant agreement rules, including relevant violations and measures we have taken against you. For example, if you or the account you use uploads illegal content that seriously violates our platform rules, violates laws and regulations and/or violates public order and good customs, causes major social impact, and causes reputation damage to our platform, we may publicly disclose your information and punishment. (This should explain the types of personal sensitive information that may be included in public disclosure and the security measures that will be taken)
- Affiliated Services: To facilitate us to provide you with services based on associated accounts (such as cooperation with third parties through technical methods such as SDK and API). We will only share necessary personal information (for example, to facilitate your use of our account to log in and use our affiliated company's products or services, we will share your necessary personal information with affiliated companies).
- Authorized Partners: We will entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for legal, legitimate, necessary, specific, and clear purposes. Authorized partners can only access the information necessary for them to perform their duties and cannot use this information for any other purpose.
4.2 Types of Authorized Partners
Currently, our authorized partners include the following types:
- Advertising and Analytics Partners: Unless we have your permission, we will not share your personal identity information (information that can identify you, such as phone numbers, through which you can be contacted or identified) with partners providing advertising and analytics services. We will only provide these partners with statistical information that cannot identify individuals to help them understand their audience or customers. Limited by the technical capabilities based on cooperation, depending on the hardware facilities you use, some partners may obtain your device model, operating system type and version, screen density and resolution, international mobile device identification code (IMEI/IDFA), network device hardware address (MAC), and other device information. However, we will require partners to technically protect the information and not use it for any illegal purposes.
- Suppliers, Service Providers, and Other Partners: We send information to suppliers, service providers, and other partners that support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, payment convenience, or conducting academic research and investigations. For companies, organizations, and individuals with whom we share personal information, we will sign strict data protection agreements with them, requiring them to process personal information in accordance with our instructions, this policy, and any other relevant confidentiality and security measures. If we share your personal sensitive information or authorized partners change the purpose of use and processing of personal information, we will seek your authorization and consent again.
- Third-Party SDK Service Providers: Our products may contain third-party SDKs or similar applications. When you use such services provided by third parties on our platform, you agree that they will directly collect and process your information (such as in the form of embedded code, plugins, etc.). For the third-party SDK services currently included in our products, please refer to the DayTicker Third-Party SDK Directory. The collection and processing of information by the aforementioned service providers comply with their own privacy terms and are not subject to this policy. To maximize the protection of your information security, we recommend that you review their privacy terms before using any third-party SDK services. To protect your legitimate rights and interests, if you find that such SDKs or similar applications pose risks, we recommend that you immediately terminate related operations and contact us.
- Dispute Resolution: If the content you publish causes infringement to a third party, and the complaining party, judicial agency, or administrative law enforcement agency requests information disclosure, we will provide necessary information such as the contact information of the complained user to the above-mentioned agencies to promote the resolution of disputes. Our platform only bears corresponding legal liability when the law clearly stipulates.
4.3 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
- Transfer with Explicit Consent: After obtaining your explicit consent, we will transfer your personal information to other parties. In the event of a merger, acquisition, reorganization, sale of assets, or bankruptcy of our platform service provider, or other circumstances involving merger, acquisition, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization, or individual to re-seek your authorization and consent.
4.4 Exceptions to Prior Authorization and Consent
In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require prior authorization and consent:
- Related to national security and defense security
- Related to public safety, public health, and major public interests
- Related to criminal investigation, prosecution, trial, and judgment execution
- For maintaining your or other individuals' major legitimate rights and interests such as life and property, but it is difficult to obtain consent
- Personal information that you yourself disclose to the public
- Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels
According to legal provisions, sharing and transferring de-identified personal information and ensuring that data recipients cannot restore and re-identify personal information subjects does not constitute external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require separate notification to you and your consent.
If you do not agree with us providing your personal information to third parties in accordance with the above terms, please stop using our platform services immediately.
5. Data Security
To ensure the security of your personal information we collect, we promise to strive to reach a reasonable security level. The specific security measures and security capabilities are described as follows:
5.1 Technical Protection
To protect your information security, we strive to take various reasonable physical, electronic, and management security measures that meet industry standards to protect your information, so that your information will not be leaked, damaged, or lost, including but not limited to SSL, information encryption storage, and data center access control. We use encryption technology to improve the security of personal information; we use trusted protection mechanisms to prevent personal information from being maliciously attacked; we deploy access control mechanisms to ensure that only authorized personnel can access personal information.
5.2 Security System Assurance
We have an industry-leading data security management system centered on data and carried out around the data life cycle, improving the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.
5.3 Personnel Security Management
We also strictly manage employees or outsourced personnel who may come into contact with your information, including but not limited to adopting different permission controls according to different positions, signing confidentiality agreements with them, and monitoring their operations. We will provide corresponding security measures in accordance with existing technology to protect your information and provide reasonable security guarantees. We will do our best to ensure that your information is not leaked, damaged, or lost. We will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
5.4 Sensitive Information and Password Protection
- Personal Sensitive Information Protection: Information that you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information, such as when you upload avatar images, or when you choose to upload images containing personal information when commenting, posting, or sending bullet comments. Please consider more carefully whether to share or even publicly share relevant information when using our services.
- Use Complex Passwords or Dynamic Verification Codes: Please use complex passwords or dynamic verification codes to help us ensure your account security. We will do our best to ensure the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, causing damage to your legitimate rights and interests, we will bear corresponding legal liability.
- Account Security: Your account has security protection functions. Please keep your account and password information properly. We will ensure that your information is not lost, misused, or altered through measures such as backing up to other servers and encrypting user passwords. Despite the aforementioned security measures, please also understand that there is no "perfect security measure" on the information network.
5.5 Information Disclosure Reminder and Password Leakage Handling
Please note that the Internet is not an absolutely secure environment. When using certain services of our platform, you will inevitably disclose your personal information to the transaction counterparty or potential transaction counterparty, such as bank account information, contact information, or postal address. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information has been leaked, especially if your account and password have been leaked, please contact our customer service immediately so that we can take corresponding measures.
5.6 Information Security Incident Handling
After an unfortunate personal information security incident occurs, we will inform you in accordance with legal requirements: the basic situation and possible impact of the security incident, measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will inform you of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform each personal information subject one by one, we will take reasonable and effective ways to publish announcements. At the same time, we will also report the handling of personal information security incidents to regulatory authorities as required.
7. Your Rights and Choices
We provide convenient methods for you to access, correct, and delete your account information or other personal information you provide when using our services. You can access and manage your personal information in the following ways:
7.1 Access Your Personal Information
You have the right to access your personal information, except as otherwise provided by laws and regulations. You can access your personal information in the following ways:
You can view your personal information through "My." You can edit and manage your personal information through "Edit Profile" and "Settings."
7.2 Correct or Supplement Your Personal Information
When you find that the personal information we process about you is incorrect, you have the right to request us to make corrections or supplements. You can make corrections or supplements through the methods listed in "7.1 Access Your Personal Information."
7.3 Delete Your Personal Information
You can delete part of your personal information through the methods listed in "7.1 Access Your Personal Information."
After you delete part of the information, we will retain your personal data for the period necessary to achieve the purposes described in this policy, unless the retention period is extended as required or permitted by law. You can also choose to cancel your account. After you cancel your account, we will stop providing products and services based on that account, and unless there are special legal requirements, we will delete or anonymize your corresponding personal data.
7.4 Change the Scope of Your Authorization and Consent
Each business function requires some basic personal information to be completed. In addition, for the collection and use of additional personal information, you can give or withdraw your authorization and consent in "Settings" or by contacting our platform customer service.
After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the personal information processing that has been carried out based on your authorization.
7.5 Account Cancellation
If you need to cancel your account, you can also contact our platform customer service. After the customer service verifies the user's identity, they will release the user's phone number to achieve the cancellation effect.
After you actively cancel your account, we will stop providing you with products or services, delete your personal information in accordance with applicable laws, or anonymize it.
7.6 Restrict Information System Automatic Decision-Making
In some business functions, we may make decisions solely based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request us to make explanations, and we will also provide appeal methods without infringing on our platform's trade secrets or other user rights and social public interests.
7.7 Withdraw Authorization
Permission Authorization Withdrawal: Users can withdraw authorization for DayTicker's push notifications, geographic location, storage space, etc. in the device's operating system, or contact us by sending an email to deqiutseng@gmail.com. We will reply to your request within fifteen (15) working days after you make the request, and based on your request, we will no longer collect, use, and/or disclose your personal information thereafter.
After users withdraw authorization, DayTicker cannot continue to provide services corresponding to the authorization and will no longer process the user's corresponding information. The user's decision to withdraw authorization does not affect the information processing that has been carried out based on the user's authorization.
7.8 Obtain and Transfer Personal Information Copies
If you need a copy of your personal information, you can contact us by sending an email to deqiutseng@gmail.com. After verifying your identity, we will provide you with a copy of your personal information in our services, except as otherwise provided by laws and regulations.
If you need to transfer your personal information, you can contact us by sending an email to deqiutseng@gmail.com. After verifying your identity, we will assist you in transferring in accordance with relevant laws and regulations.
7.9 Respond to Your Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. We may first ask you to verify your identity before processing your request.
We will respond within 15 days. If you are not satisfied, you can also file a complaint through our platform customer service.
For your reasonable requests, we will not charge fees in principle, but for multiple repeated requests that exceed reasonable limits, we will charge a certain cost fee as appropriate. For those groundless repeated requests, requests that require too many technical means (for example, need to develop new systems or fundamentally change current practices), requests that bring risks to the legitimate rights and interests of others, or very unrealistic requests, we may refuse.
In the following circumstances, in accordance with legal requirements, we will not be able to respond to your request:
- Related to national security and defense security
- Related to public safety, public health, and major public interests
- Related to criminal investigation, prosecution, trial, and judgment execution
- There is sufficient evidence that the personal information subject has subjective malice or abuse of rights
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations
- Involving trade secrets
6. Data Storage
The information and materials we collect about you will be stored on servers controlled, used, or leased by us and/or our affiliated companies. We will strictly maintain confidentiality and use control over your relevant information and materials. This information and materials may be transmitted to your country, region, or the location where we collect information and materials, and be accessed, stored, and displayed there. For rules regarding the storage and cross-border transfer of your personal information, please see Section 9.
Data Retention Period: We will take reasonable and feasible measures to avoid collecting irrelevant personal information. Generally, we will keep your personal information for three years. The above retention period is the shortest period required to achieve the purposes described in this policy, unless you agree to extend the retention period or are permitted by law. After the retention period expires, we will delete or anonymize your personal information.
If our platform service decides to stop operations, we will stop continuing to collect your personal information after the relevant service stops operating. We will notify you of the cessation of operations in the form of an announcement. We will delete or anonymize your personal information that we already hold.
Factors we consider when determining retention periods include:
- The nature and sensitivity of the information
- The purposes for which we process the information
- Legal and regulatory requirements
- Operational needs and business continuity
- The potential risk of harm from unauthorized use or disclosure
8. Children's Privacy
We attach great importance to the protection of minors' personal information. If you are a minor, please stop using the services of this product.
In addition, to better protect the privacy rights and interests of minors, DayTicker especially reminds you to carefully publish and forward content related to minors' privacy. DayTicker will report illegal information involving minors to network information, public security, and other departments as appropriate.
9. International Data Transfers
The personal information we collect and generate during our global operations is stored in Singapore, except in the following circumstances:
- Laws and regulations clearly stipulate otherwise
- We have obtained your explicit authorization
For the above circumstances, we will ensure that we provide sufficient protection for your personal information in accordance with this privacy policy.
Your information may be transferred to and processed in countries other than your country of residence. These countries may have data protection laws that differ from those in your jurisdiction. By using DayTicker, you consent to the transfer of your information to these countries. We take appropriate safeguards to ensure your information remains protected in accordance with this Privacy Policy and applicable data protection laws, including the use of standard contractual clauses and other legal mechanisms.
9. Third-Party Services and Links
Our Services may contain links to third-party websites, applications, or services that are not owned or controlled by DayTicker. This Privacy Policy does not apply to third-party services. We are not responsible for the privacy practices or content of third-party services. We encourage you to read the privacy policies of any third-party services you access through DayTicker.
10. Changes to This Privacy Policy
Our platform has the right to modify the privacy policy and will notify you through our official private messages and pop-up reminders before the revision takes effect. In this case, if you continue to use our services, it means that you agree to be bound by the revised platform privacy policy.
We may update this Privacy Policy from time to time to reflect changes in our practices, technology, legal requirements, or other factors. We will notify you of any material changes by:
- Posting the updated policy on this page with a new "Last Updated" date
- Sending you a notification through the application or via email (if applicable)
- Displaying a prominent notice within the application
Your continued use of DayTicker after any changes to this Privacy Policy constitutes your acceptance of the updated policy. We encourage you to review this Privacy Policy periodically to stay informed about how we protect your information.
11. Regional Privacy Rights
11.1 California Privacy Rights (CCPA)
If you are a California resident, you have additional rights under the California Consumer Privacy Act (CCPA), including:
- The right to know what personal information we collect, use, and disclose
- The right to delete personal information we hold about you
- The right to opt out of the sale of personal information (we do not sell personal information)
- The right to non-discrimination for exercising your privacy rights
11.2 European Privacy Rights (GDPR)
If you are located in the European Economic Area (EEA), you have additional rights under the General Data Protection Regulation (GDPR), including:
- The right to access and receive a copy of your personal data
- The right to rectify inaccurate or incomplete data
- The right to erasure ("right to be forgotten")
- The right to restrict processing
- The right to data portability
- The right to object to processing
- Rights related to automated decision-making and profiling
To exercise these rights, please contact us using the information provided below.