Introduction
Welcome to our mobile eSIM service. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our eSIM services. Please read this privacy policy carefully. If you do not agree with the terms of this privacy policy, please do not access the service.
We are committed to protecting your privacy and ensuring the security of your personal information. This policy applies to all information collected through our eSIM services, including data transmitted over cellular networks and stored on your device.
Information We Collect
Personal Information
- • Name and contact information
- • Email address and phone number
- • Billing and payment information
- • Device information and identifiers
- • Location data (when permitted)
Technical Information
- • Device model and operating system
- • Network connection details
- • eSIM profile information
- • Service usage statistics
- • Error logs and diagnostic data
Usage Information
- • Data consumption patterns
- • Service activation and deactivation
- • Customer support interactions
- • Website and app usage analytics
How We Use Your Information
Service Provision
To provide, maintain, and improve our eSIM services, including activation, configuration, and technical support.
Communication
To send service updates, notifications, and respond to your inquiries and support requests.
Security & Fraud Prevention
To protect against fraud, unauthorized access, and ensure the security of our services and your data.
Analytics & Improvement
To analyze usage patterns, improve our services, and develop new features and capabilities.
Information Sharing and Disclosure
We Do Not Sell Your Data
We do not sell, trade, or rent your personal information to third parties for marketing purposes.
Service Providers
We may share information with trusted third-party service providers who assist us in operating our services, such as payment processors and network operators.
Legal Requirements
We may disclose information when required by law, court order, or to protect our rights, property, or safety, or that of our users.
Business Transfers
In the event of a merger, acquisition, or sale of assets, your information may be transferred as part of the transaction.
Data Security
Encryption
All data is encrypted in transit and at rest using industry-standard encryption protocols.
Access Controls
Strict access controls and authentication mechanisms protect your data from unauthorized access.
Monitoring
Continuous monitoring and security audits ensure the integrity and security of our systems.
Your Privacy Rights
You have the right to:
Contact Us
If you have any questions about this Privacy Policy or our data practices, please contact us:
Email: [email protected]
Subject Line: Privacy Policy Inquiry
Response Time: We will respond to your inquiry within 30 days.
Changes to This Policy
We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the "Last updated" date. You are advised to review this Privacy Policy periodically for any changes.