Keeping your data safe and secure is our top priority. We've taken many steps to ensure that your information is not used in unintended ways:
Within the ChatMap App
Our goal is to ensure that your data is secured in all areas of usage. The ChatMap app uses end-to-end encryption to ensure your data is kept private. The following outlines the various steps we take to ensure your data is not compromised using the ChatMap app:
|Encrypted In Transit (HTTPS)||Encrypted At Rest Server||Encrypted At Rest Device||Data Retention Policy Server||Data Retention Policy Device|
|Secured from interception in transit using https. Cannot be eavesdropped on by anyone on the internet between the server and your device.||Encrypted with a random passcode on the device before leaving the handset. Passcode is then further encrypted using a public/private keypair so that only the intended parties (your friends) can read it. Even if we wanted to eavesdrop, or a government forced us to, we couldn’t decrypt it.||We use Apple’s built in encryption to secure your data. Be sure to set a passcode or touch id for your device to be secure.||Our goal is to only keep data that user’s need us to keep. We don’t want to know what you’re saying or where you are, but even if we did, we couldn’t listen in. We encrypt your sensitive data with random keys generated on your device and your friend’s devices.||Conversations are ephemeral. History is only stored on the device for up to 24 hours. All app data is encrypted using the device’s passcode and hardware encryption.|
|Audio files||Encrypted file is deleted on server after successful download. Can only be decrypted by people you send it to. Not even us can listen in.||File is unencrypted on the device for playback and then re-encrypted using the device passcode and stored for only 24 hours.|
|Location data||Only your last location is stored, however it is encrypted and can’t be read by anyone (even us) except for the people you share your location with.||Only your last location is stored. Encrypted on device with hardware password.|
|Text Messages||Encrypted message is deleted on server after successful download. Can only be decrypted by the people you send it to.||Message is unencrypted on device for viewing and then re-encrypted using the device passcode and stored for only 24 hours.|
|Images sent as a message||Encrypted file is deleted on server after successful download. Can only be decrypted by the people you send it to.||File is unencrypted on the device for playback and then re-encrypted using the device passcode and stored for only 24 hours.|
|Images placed on map||Saved indefinitely until deleted by a user.||Saved indefinitely until deleted by a user.|
|User name, user provided profile information||Saved indefinitely until deleted by user.||Saved indefinitely until deleted by user.|
|Message meta data (from, to, date, channel)||Deleted on server after successful download from a user in the foreground of the app.||Deleted after 24 hours.|
|Channel names||Saved indefinitely until deleted by user.||Saved indefinitely until deleted by user.|
|User's friend lists||Saved indefinitely until deleted by user.||Saved indefinitely until deleted by user.|
|Channel lines drawn on the map.||Saved indefinitely until deleted by user.||Saved indefinitely until deleted by user.|
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
We do not use vulnerability scanning and/or scanning to PCI standards. We do not use Malware Scanning.
We implement a variety of security measures when a user places an order to maintain the safety of your personal information.
Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies. If you disable cookies, some features that rely on cookies may no longer work (which makes sense).
According to CalOPPA we agree to the following:
How does our site handle do not track signals?
We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under 13.
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
• Within 7 business days
We will notify the users via in site notification within 7 business days.
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to Send information, respond to inquiries, and/or other requests or questions.
To be in accordance with CANSPAM we agree to the following:
340 S. Lemon Ave, Suite #1542 Walnut, CA 91789