Permissions Declaration for Shihori Sahay

Complete transparency about the permissions we request and why

1. Our Commitment to Clarity

Welcome to Shihori Sahay. We believe in providing complete clarity regarding the device permissions our application requests. This document explains the specific purpose behind each permission we seek, ensuring you fully understand how data is utilized to power our personal assessment and guide tool. By engaging with our app, you acknowledge these practices. For a comprehensive understanding of your data rights, please refer to our detailed Privacy Policy at: https://www.shihorisahay.com/privacy-policy. All your data is safeguarded through encryption and securely transmitted to our server at https://www.shihorisahay.com.

2. Information We Request

To effectively deliver and maintain the functionalities of our Service, we seek your explicit consent to gather the types of data listed below. Opting out of certain permissions might restrict your access to specific features.

2.1. Contact Email

Used for establishing your account, facilitating logins, aiding in password recovery, and sending crucial service-related notifications.

2.2. Registered Phone Number

Essential for validating your identity and serving as a fundamental security layer for your account.

2.3. Camera and Gallery Access

This capability is for optional enhancements, such as enabling you to upload images for account verification or to customize your profile avatar.

2.4. Designated Emergency Contact

Enables us to reach a trusted individual as a secondary security measure if unusual account activity is detected and we cannot reach you directly.

2.5. Unique User & Device Identifiers

Distinct markers that assist in securing your account, combating fraudulent activities, and ensuring a consistent user experience across devices.

2.6. Advertising Identifier (Ad ID)

Employed for presenting relevant informational content and service announcements. You retain the ability to manage or deactivate this via your device settings.

2.7. Location Data (Approximate)

We may infer your general location (e.g., city/state) from network information or IP address. This helps us to provide localized insights, ensure compliance with regional regulations, and enhance security by detecting atypical access patterns. This data is not used for precise real-time tracking.

2.8. System Activity Logs (Crash Reports)

Automated technical records generated when the application encounters an error. This anonymous data is exclusively used for diagnosing and rectifying technical glitches.

2.9. Installed Applications List

To improve our security protocols, identify potential malicious software that could compromise your device or account, and better understand general application usage patterns, we may access a list of applications installed on your device. This helps us offer more relevant guidance within the Service.

2.10. Device Communication Logs

We request temporary access to your call history solely for the automated verification of your phone number during initial setup or security checks. Our system identifies an incoming verification call to streamline your registration process. We do not store, review, or analyze any other personal call records.

2.11. Comprehensive Device Metrics

We gather various technical details about your mobile device to optimize app performance, ensure compatibility, strengthen security, and assist with troubleshooting. This includes:

  • Storage Metrics: Information about your device's available and total storage space, crucial for efficient app operation and updates.
  • Battery Status: Data on your device's battery level and health, used to fine-tune energy consumption.
  • Bluetooth Connectivity: Status of Bluetooth (on/off) or linked devices, potentially for specific optional features.
  • Hardware Specifications: Details like device model, manufacturer, and operating system version for compatibility and error reporting.
  • Memory Utilization: Information on system memory (RAM) usage, aiding in performance optimization.
  • Network Connection State: Details about your internet connection (Wi-Fi, cellular data type) and strength, ensuring stable communication.
  • Sensor Data: Access to certain device sensors (e.g., accelerometer, gyroscope) may be used for security (e.g., detecting device integrity) or to enhance feature-specific interactions.

3. Data Protection and Your Privileges

We are dedicated to protecting all gathered information with robust encryption protocols. You maintain complete sovereignty over your data, possessing the right to review, modify, and request its removal. The precise procedures for exercising these privileges are clearly detailed within our Privacy Policy.

4. Reach Out to Us

Should you have any queries or concerns regarding these permissions, please do not hesitate to connect with us.

Email: business@shihorisahay.com

Official Website: https://www.shihorisahay.com