We are committed to safeguarding the privacy of our website visitors; this policy sets out how we will treat your personal information.
Information we collect
When you register on hiddenapp.com you provide us with your email. After you have completed your first payment we will also collect your first and last name from the payment provider.
We do not collect any information from your computer until you set the status to stolen in your tracking control panel. Once the computer has been marked as stolen we begin to collect the internal and external ip's of the stolen computer, information about the computers network environment, the active username, screenshots and photos of the thief if an iSight is present on the computer. Once collected the information is stored in your tracking control panel where you have the option to delete any information that you no longer require. We will not collect any images or information from your computer until you report the computer as stolen.
We use "cookies" (small pieces of data we store for an extended period of time on your computer, mobile phone, or other device) to make hiddenapp.com easier to use and to protect both you and hiddenapp.com. For example, we use them to confirm that you are logged into hiddenapp.com. You can remove or block cookies using the settings in your browser, but in some cases that may impact your ability to use hiddenapp.com.
We do not store credit card details nor do we share customer details with any 3rd parties.
How we use collected information
We use your account information to enable services such as the tracking control panel, and provide you with customer support.
We may contact you with service related announcements, order confirmations and other necessary information.
We will not sell or share any of your personal information or information collected from your stolen computer to third parties unless they are directly involved in the recovery of your stolen computer.
We will take reasonable technical and organisational precautions to prevent the loss, misuse or alteration of your personal information.