Privacy Policy


Here at Evil Scan, we understand how crucial privacy is. This Privacy Statement covers all Android applications distributed by Evil Scan. The information we gather and why we collect it will be made explicit. Your information is not, and will never be, for sale to any other parties. Our major goal in amassing this information is to better prepare you with powerful goods and services for dealing with emerging, unexpected dangers. With this Policy, we want to make clear how and why we gather, use, and share information about you. Information you provide us helps us give you a better service and overall better experience. By using our applications, you agree that we may collect data about your use, statistics, and input in accordance with our Privacy Policy.

WHAT WE GATHERED FROM THE DATA


• Generally. To better tailor and enhance your experience with us, we may need personal information from you.

o We may share your personal information as described below if required to do so by law or at your direction:

First, we need your prior consent,

If required to do so by a court order, subpoena, or other formal legal procedure;

3) In response to official demands from the public and government,

4) To safeguard our legal interests and rights.


The use of a generic identifier. We may gather aggregated, non-personally identifiable information about your device, its apps, and how you use them. Information you voluntarily offer us, such as your name and email address, while providing us with feedback on our application and services.

The following are examples of when we could acquire and utilize non-personal data:

1) To get a deeper comprehension of user habits.,

Two) Address issues with existing goods and services.

3) We will enhance our offerings and expand our marketing efforts.


Other Sources of Analytical and Monetization Data:

o The following third-party SDKs are incorporated into our app and may have access to your data:

ID for Google Ads.

Information about your gadget (its make and model, its technical specifications, its location, etc.)

Advertise, promote, and analyze using this information.

Cookies may be stored and accessed by advertisers.

We do not control the actions of third-party SDK providers and are not responsible for the information they gather. Monetization partners like Google Admob are examples of the third parties.


The Android Ad ID

To provide you a more relevant ad experience, we utilize your Android advertising identity. Only advertising and analytics make use of it. The advertising identification does not include personally identifiable information that may be used to identify you or your device. It is not linked to personally identifiable details or any permanent device identifier (such an SSAID, MAC address, IMEI, etc.).


User-installed applications data is collected and processed by App Permission & Tracker, which provides statistics on the app's permission list, installed version, embedded trackers, and more. All Logs and Trackers Data Can Be Found With This. A Tracker is an application that monitors and records your actions. such as AdWords on Google and Facebook, and many more besides.

o The following accesses may be required by certain of our applications on your device:

To check your device's installed applications for malware, suspicious, or hidden ones, you may utilize the QUERY_ALL_PACKAGES permission.

2) PLACE - used in identifying and assessing your Wi-Fi system.

3) LOCAL STORAGE, which is checked for malware in order to clean the device.

4) FOREGROUND_SERVICE - utilized for in-the-background maintenance and cleaning.

5.) PACKAGE_USAGE_STATS - used to get the apk, data, and cache sizes.

Sixth, the camera button is for accessing the device's camera settings (both front and back).

WHAT WE DO WITH THE DATA WE GATHER

Only to better serve you, we may utilize the information you provide below:

o To cater to each individual user;

To offer, maintain, enhance, and develop our services, we may utilize Non-Personal Information.

We may use the non-personal data we gather for marketing and promotional reasons, such as showing you ads for applications that may be of interest to you.

We use your data for things like sending you emails and push notifications, as well as for running, maintaining, and providing the features and functionality of our Apps to you. We may also contact you through email or other means to provide you with information and updates relating to the Service (for example, account verification, order confirmations, changes or updates to the functionality of our applications, technical and security notifications).

WHO MAY VIEW YOUR INFORMATION AND HOW

o Sensitive Data. Because we don't collect or keep any of your private data, we won't share it with anybody.

o De-Identifiable Data. We do not merge Personal Information (such your name and User Device number) with Non-Personal Information.

o We may share aggregated, non-personal data with trustworthy third parties for marketing purposes who agree to abide by this policy and all applicable privacy regulations.

SECURITY OF DATA COLLECTED

All the data we gather is kept in secure databases. Security protocols are in place to keep your data safe, and only the people who need it to keep our websites and applications running smoothly, notably our technical support staff, have access to it.

SPONSORED LINKS

In general, the Site, the Services, and the Applications use application interfaces to access data stored on other services (like your Facebook profile). As a courtesy to our users, we may offer connections to other websites like Facebook. Advertisements from third parties may also be included on the Site. You may be redirected to a third party's website when you click on a link to that website from within an Application, the Services, or the Site. Although we do not control or monitor these other websites, our name or emblem may appear on them in some capacity. Web sites managed by third parties that are linked to or otherwise accessible via an Application, the Services, or the Site are not covered by this Policy, and we are not responsible for their privacy policies. Access to or inclusion of a link to third-party websites does not constitute our approval of or participation in such websites.

People you trust with your data

The acts of other Users with whom you choose to share your information are outside our control. We have no responsibility or liability for the use or disclosure of any information that you voluntarily provide to other Users via an Application, the Services, or the Site (including through Forums). If our security is breached by a third party, we cannot be held liable.

SECURITY

The privacy of your data is of the utmost importance to us. We do not gather any personally identifiable information, and we take administrative, physical, and technological steps to safeguard your non-personally identifiable information. Please be aware that no security system can ensure 100% protection against unauthorized access or use of your Non-Personal Information, no matter how well we implement it.

VIRUSES AND PUP INFORMATION

When our products identify malicious software or potentially unwanted programs, we log that information. We assemble:

The virus or PUP's vendor name has been scrubbed from the system.

To what database rule the removal of the malware or PUP was attributed, encrypted.

viruses, potentially unwanted programs, or suspicious files. o Artifacts.

Data pertaining to anomalous occurrences.

Databases downloaded and updating on regular basis.

RATIONALE INFORMATION

The information we get is used either directly by the program or to improve our service to you. In order to undertake system rollback and recovery procedures, for instance, it may be necessary to gather system processes and behaviors.

CONFIDENTIAL MATERIAL

Do not post or otherwise make available on or through any Application, the Services, the Site, or otherwise to us any personally identifying information (e.g., information related to race or ethnicity, political opinions, religion or other beliefs, health, sexual orientation, criminal background, or past membership in organizations, including trade union memberships).

MODIFICATIONS TO THIS PRIVACY STATEMENT

Please note that if we decide to make any changes to our Privacy Policy, we will announce those changes here. Depending on the nature of the change or update, we may choose to notify you via a different channel.

Your only remedy if you do not agree to any changes to this Policy is to cease using the Site, the Services, and any and all Applications immediately. By continuing to use any Application, the Services, or the Site after any changes to this Policy have been posted, you agree to be bound by the terms of the updated Policy. All of our Policies are final and cannot be changed by any of our employees or representatives.

Privacy Guidelines for Children

This Children's Privacy Policy is intended to provide you, the legal guardian of a child under the age of 13, with details on how we collect, use, and disclose personal information about children.

We do not collect or use any Personal Information from children and youngsters under the age of 13, and many of our Games/Apps are designed for a wide audience. If a user is under the age of 13, we will either not collect any personal information from them or will get their parents' permission first.

o If you are a parent and you learn that your kid is under the age of 13 and has given us Personal Information, please get in touch with us.

o We provide both apps that are not aimed at users under the age of 13 and apps that are aimed at children under the age of 13 (collectively referred to as "Kids Apps").

Contact us at info@EvilScan.com if you have any more questions concerning our Privacy Practices in regards to minors under the age of 13.

CONSENT

If you've given us permission to do so, we could provide your information to other services like social media platforms. Similarly, allowing others to see your profile, content, or other information on a forum or blog constitutes your acceptance of that material's public usage. Any information you provide in these areas may and will be read, collected, and used by anyone who has access to them. You will be added to the forum's online member directory, which is viewable by the general public. In addition to these and other recommendations, we also showcase consumer testimonials on our websites. If you give us permission, we'd want to use your name in conjunction with your testimonial. Contact us at info@EvilScan.com if you'd like to make any changes to, or remove entirely, your testimonial.

HOW COME WE MUST ASK FOR PERMISSION?

When using the app, be sure to provide the following permissions:

This software requests access to your camera so it may access device data, including images taken with the front and back cameras.

Location permission is required since this program will be accessing IP addresses and doing DNS queries.

This program requests access to your device's storage, as well as your system and user apps, as well as your phone's features and settings.

WHY IS ACCESSIBILITY SERVICE NECESSARY FOR APPS?

This program relies on the Accessibility Service to monitor camera and microphone use and alert the user accordingly. The privacy indicator will be ineffective without it. Turn on the accessibility service in Evil Scan.

Is Privacy Indicator also tapping into my microphone and camera?

That's an intriguing question. However, Privacy Indicator will never access your device's camera or microphone. It's simply there so you may adjust the indicator dot's settings in real time.

You should know why other permissions are used in general terms.

1. ACCESS_NETWORK_STATE:

This permission is used by certain of our apps to have access to network data. Our applications will just tell you of network-related facts, such as whether or not you are now online. We do not participate in data mining or sharing.

2. ACCESS_COARSE_LOCATION

Approximate positions obtained from network location sources like cell towers and Wi-Fi may be accessed by certain of our apps with this permission. There is no way to track down this data. We don't track our users or give out their whereabouts.

3. ACCESS_FINE_LOCATION

This access is required for certain of our apps to have access to location-specific data that is obtained from the network. There is no way to track down this data. We don't track our users or give out their whereabouts.

4. Two such permissions are WRITE_EXTERNAL_STORAGE and READ_EXTERNAL_STORAGE.

These rights may be used by certain of our programs to read Media files stored on USB drives. Information is not collected, stored, or shared by us.

5. INTERNET:

The ability to create network sockets may be used by certain of our apps. Our applications only access the internet through the INTERNET permission. We don't snoop on networks or sell user data.

6. READ_PHONE_STATE

Access to the phone's phone number, current cellular network information, call status, and a list of registered Phone Accounts may be used by certain of our apps that request this permission. No data is gathered, stored, or shared by us.

7. CALL_PHONE

This access is necessary for certain of our apps to make calls without first using the Dialer to look for USSD codes. Neither of these things are done by us.

8.READ_CONTACTS

This access is used by some of our apps to access your contacts when you ask them to. Neither of these things are done by us. With this access, we are able to announce who is calling you or show you recent calls made, received, and missed.

9.READ_GSERVICES

The READ_GSERVICES permission is required for any of our apps that make use of the Google Services Framework. There is no way to track down this data.

10. VIBRATE

This access might be used by a few of our apps so they can detect the current vibration level and adjust it as necessary.

11.WAKE_LOCK

To prevent the computer from entering sleep mode or the display from going dark, certain of our programs may request access to the Power Manager Wake Locks. When a digital clock has to be shown on the screen.

12.RECEIVE_BOOT_COMPLETED

This permission is used by several of our apps to enable alarms, background services, etc. Once the system has finished booting.

13. SET_ALARM

This access is required for certain of our apps to access device and set alerts.

14Send, Read, and Get Text Messages

These rights are used by certain of our apps so that they may access, send, and receive SMS messages from the device. We do not read, store, or forward any of your correspondence. This is really safe and secure.

15. SET_WALLPAPER

The chosen picture may be used as background by certain of our apps if this permission is granted.

16.SET_WALLPAPER_HINTS

With this access, certain of our apps can resize and modify specific wallpaper dimensions.

17.ACCESS_WIFI_STATE

With this permission, certain of our apps can get access to data about available wireless networks. We do not track or distribute data related to wireless networks.

18. CHANGE_WIFI_STATE

When requested, some of our apps may utilize this access to toggle the Wi-Fi connection (WIFI ON / WIFI OFF).

19. BLUETOOTH

When asked, some of our apps will utilize this access to link together any Bluetooth devices you've associated with them.

20.BLUETOOTH_ADMIN

We may use this access to find nearby Bluetooth devices and link them with our apps.

21. BLUETOOTH_PRIVILEGED

This permission is used by some of our apps to automatically connect Bluetooth devices, control access to the user's phonebook and messages, and more. Information is not stored or shared.

22. WRITE_SECURE_SETTINGS

This permission is used by certain of our apps to have access to the device's security options. We are not a data-gathering organization.

23. WRITE_SETTINGS

In response to user requests, certain of our apps may utilize this access to modify system-wide settings like ringtone, vibration, screen brightness, etc.

24. CAMERA

When granted, this permission allows our apps to access the camera, record video, and enable or disable the flash. Your photographs and videos will not be stored or shared.

25. FLASHLIGHT

This access is required for certain of our apps to utilize the Camera Flash toggle. This allows us to take pictures, use a flashlight during an alert service, or use a flashlight during a clap service.

26. DISABLE_KEYGUARD

Some of our apps may need this access to continue using our features even when the screen is off.

27. RECORD_AUDIO

This permission is used by some of our apps to capture audio when you ask them to. We do not collect or distribute any of the data.

28. MODIFY_AUDIO_SETTINGS

When granted, this permission allows one or more of our apps to make system-wide changes to the way sound is handled.

29. BATTERY_STATS

This permission is used by certain of our apps to access battery data (percentage, capacity, etc.) in order to show how well the battery is functioning.

30. GET_ACCOUNTS

This permission is used by certain of our apps to check whether users have a Google account, verify the status of Google Services, and provide customized app download and update processes. Your account information is never saved or shared. Extreme security is provided.

31.SYSTEM_ALERT_WINDOW

This permission allows some of our apps to generate windows that may appear on top of other programs.

32.READ_CALENDAR

Access to CALENDAR data may be used by certain of our apps. This data is not stored or shared.

33. Both READ_CALL_LOG and WRITE_CALL_LOG are required.

This access is used by several of our apps so that users may see their device's call history. Your phone calls are not recorded, stored, or shared in any way. This is really safe and secure.

34. CLEAR_APP_CACHE

When requested, certain of our apps may utilize this access to delete all of the system's cached data.

35.KILL_BACKGROUND_PROCESSES

When requested, certain of our apps may utilize this access to terminate all running processes on your device.

36. GET_PACKAGE_SIZE

So that you may better manage your mobile storage, certain of our apps may request permission to access information about the space of utilized applications.

37. MOUNT_UNMOUNT_FILESYSTEMS

This access is required for certain of our apps so they may add and delete file systems used for off-system storage.

38. Read Sync Settings and Write Sync Settings

These access controls may be used by certain of our apps to enable SYNC power-saving options.

39. RESTART_PACKAGES

It's possible that some of our programs may need this access in order to terminate Background Processes. We utilize these rights to enhance mobile performance at the user's request, which includes breaking other apps by disabling their alerts, halting their services, etc.

40. ACTUAL_GET_TASKS, ACTUAL_GET_TASKS

These authorizations may be used by certain of our apps to acquire work. Your task data is never stored or shared.

GET IN TOUCH

Feel free to email us at info@EvilScan.com if you have any concerns regarding this Privacy Policy, the site's policies, or your interactions with the site.