Our Privacy Clause
Welcome to Power Wave Electric Inc.,
We collect information about your device, including the hardware model, operating system and version, unique device identifiers (including MAC address and IMEI), browser type and language, mobile device phone number, and mobile network information. We also collect certain device information that will help us diagnose problems in the (hopefully rare) event you experience any crash or other problem while using our Services. So, for example, if we detect a crash or other problematic event, we may collect the list of apps on your device and other information about your device’s performance at the time of the event for troubleshooting purposes.
Camera and Photos.
Many of our services require us to collect images and other information from your device’s camera and photos. We’ll access your camera and photos only after you give us your consent..
2. How We Store Your Information
1) Your account information (e.g., email address, password, and phone number) will be encrypted as soon as you register for the Service, and we store and process such encrypted information in Taiwan or any other country in which we maintain facilities.
We will use commercially reasonable safeguards and take reasonable steps to keep the information encrypted at all times, so that the information will not be decrypted and accessible.
2) You are responsible for maintaining the secrecy of your unique password and account information, and for controlling access to the service at all times as we are not able to decrypt and access your encrypted account information.
3. How We Use Information
We provide you with an amazing set of Services that we improve with the information we collect. But we do a lot more as well, such as:
Provide and deliver the products, services, and functionality that you request, process transactions, and send you related information;
Communicate with you. That means just what it says; we may send you marketing communications on behalf of us or other companies; respond to your comments and questions; provide customer service; and send you technical notices, security alerts, and other informational messages;
Monitor and analyze trends and usage;
Develop, improve, and refine products, services, and functionality;
Personalize the Services by providing advertisements, content, or features that match user profiles or interests. For instance, when you set up an account we may pre-populate certain account information based on the information we collect about you from other users;
Verify your identity and prevent fraud or other unauthorized or illegal activity; and
Carry out any other purpose for which the information was collected.
4. Message Deletion
Delete is our default. That means that most messages sent through our Services will be automatically deleted once they have been viewed or have expired. But -and this is important- you should understand that users who see your messages can always save them, either by taking a screenshot or by using some other image-capture technology (whether that be software or even something as old-fashioned as a camera to take a photo of your device’s screen). If we’re able to detect that a recipient took a screenshot of a message you sent, we’ll try to notify you. But the same common sense that applies to the Internet : Don’t send messages that you wouldn’t want someone to save or share.
In most cases, once we detect that all recipients have viewed a message, we automatically delete it from our servers. And again in most cases, the Services are programmed to delete the message from the recipients’ device as well. There is, however, an exception to this general rule:
Infinity timer: Senders can choose an infinity timer option to prevent deleting their messages from recipient’s device.
A few final words on deletion: We can’t guarantee that messages will be deleted within a specific timeframe. And even after we’ve deleted message data from our servers, that same data may remain in backup for a limited period of time. We also sometimes receive requests from law enforcement requiring us by law to suspend our ordinary server-deletion practices for specific information. Finally, of course, as with any digital information, there may be ways to access messages while still in temporary storage on recipients’ devices or, forensically, even after they are deleted.