Future of Cancer Care Begins:
2025
Call us:
(904) 834-5202

Privacy Policy

Discover fresh insights and innovative ideas by exploring our blog,  where we share creative perspectives

Privacy and Security Policy – TyMe Website

TyMe is committed to protecting the privacy and security of your information. This policy outlines our practices regarding the collection, use, and protection of your data, both within our app and on any third-party platforms we may use. We adhere to all applicable privacy and security regulations. 

On This Page 

  • Types of Information Collected 
  • How TyMe Collects Information 
  • How TyMe Uses Cookies and Similar Technologies 
  • How to Opt Out or Disable Cookies 
  • How Is Personal Information Protected? 
  • Disclosure 
  • App Security 
  • Your Interaction with TyMe on Third-Party Platforms 


Types of Information Collected 

Your privacy is important to us. When you use the [Your Organization Name] app, we may collect certain information to improve the app, personalize your experience, and provide you with relevant services. We may collect both non-personally identifiable information and, when you explicitly provide it, personally identifiable information (PII). 

How TyMe Collects Information 

To provide and improve our services, we collect information through various methods, including: 

  • App Usage Data:
    We automatically collect information about your interactions with the app. This includes details such as the features you access, the frequency and duration of your sessions, the screens you view, the buttons you tap, and the sequence of your actions. We also collect crash logs and error reports to help us diagnose and fix any issues you may encounter. 
  • Device Information:
    When you use the app, we collect information about your device. This may include the device type (e.g., iPhone, Android phone), operating system version, unique device identifiers (such as IDFA or Android ID), screen resolution, and network information (e.g., Wi-Fi or cellular network). 
  •  Location Data:  
    With your explicit consent, we may collect precise location data from your device’s GPS, Wi-Fi, or cellular signals. This information may be used to provide you with location-based services, such as [ Eg., you have arrived at the parking lot]. You can enable or disable location services in your device settings. 
  • User-Provided Information:  
    We collect information that you voluntarily provide when you use certain features of the app. This includes: 
  • Account Information:  
    When you create an account, we collect information such as your name, email address, date of birth, and phone number. 
  •  Profile Information: 
    You may choose to provide additional information for your profile, such as your profile picture, gender, and other demographic details. 
  •  Communication Data: 
    If you contact us through the app’s support channels, we collect the content of your communications, including any questions, feedback, or requests. 
  • Form Submissions:  
    When you fill out forms within the app, such as [Example: health questionnaires, surveys, feedback forms, etc.], we collect the information you enter. 
  • Questionnaire Data:  
    We collect the information you provide in the questionnaires within the app, including your answers to specific health-related questions, your lifestyle habits, and any other information you input. 
  • Health Data: 
    With your explicit consent, we collect health-related data that you provide or that is collected from your Apple Watch or other connected wearable devices. This may include data such as heart rate, activity levels, sleep patterns, and other health metrics. We only collect this data when you specifically authorize us to do so, and we use it to provide you with the services you request

We use google analytics to collect and analyze non-personally identifiable information about app usage. This data helps us understand user behavior, track app/website performance, identify trends, and improve the app’s/websites’s functionality. Access to this data is restricted to . 

How TyMe Uses Cookies and Similar Technologies 

We may use cookies and similar technologies (e.g., local storage, device identifiers) to enhance your app/websites experience. These technologies allow us to remember your preferences, maintain session information, and analyze app/websites usage.

 

  • Session Cookies: 
    We use these to maintain your active session within the app. For example, when you log in, a session cookie (or a similar mechanism using local storage) is used to remember that you are authenticated. This prevents you from having to re-enter your username and password every time you navigate to a new section of the app or perform an action that requires you to be logged in. These cookies are temporary and are automatically deleted when you close the app or your session expires. They are essential for the basic functioning of the app, such as enabling smooth navigation and allowing you to access features that require authentication. 
  • Persistent Local Storage: 
    We use persistent local storage to remember your preferences and settings across multiple sessions. This allows us to personalize your experience and provide you with a more convenient and efficient way to use the app. For instance, if you customize certain settings, such as [Example: language preference, font size, theme selection, notification preferences, or units of measurement (e.g., metric or imperial)], we store these preferences locally on your device. This means that the next time you open the app, your preferred settings are automatically applied, and you don’t have to configure them again. This technology also allows us to remember if you have completed certain onboarding steps or tutorials, so we don’t show them to you repeatedly. 

How to Opt Out or Disable Cookies 

Users can manage their preferences for cookies and similar technologies through their device settings. For example, you can disable cookies in your web browser settings. On mobile devices, you can typically control the use of device identifiers for advertising purposes in your device’s privacy settings. Please note that disabling certain technologies may affect the functionality of the app. 

How Is Personal Information Protected? 

We take reasonable measures to protect your personal information from unauthorized access, use, or disclosure. These measures include: 

  •   Data Encryption: 
    We use strong encryption algorithms to protect your data, both while it is being transmitted (in transit) and when it is stored (at rest). This means that your data is scrambled and unreadable to anyone who does not have the authorized decryption key. We employ industry-standard encryption protocols such as TLS/SSL for data in transit and AES-256 for data at rest. 
  • Secure Storage: 
    We store your data in secure, access-controlled servers and databases. These systems are protected by a combination of physical, technical, and administrative safeguards to prevent unauthorized access. We regularly back up our data to ensure its availability and protect against data loss. 
  • Access Controls: 
    Access to your personal information is strictly limited to authorized personnel who need the information to perform their job duties. We enforce the principle of least privilege, meaning that employees are only granted the minimum level of access necessary to perform their tasks. We use strong authentication methods, such as multi-factor authentication, to verify the identity of users accessing our systems. We also maintain detailed audit logs to record all access to personal information, allowing us to monitor and detect any unauthorized access. 
  • Regular Security Assessments: 
    We conduct regular security assessments and audits to identify and address potential vulnerabilities in our systems and processes. These assessments include penetration testing, vulnerability scanning, and security code reviews. 
  • Employee Training:
    All employees undergo comprehensive and ongoing training on privacy and security best practices. This training covers topics such as data protection laws, handling of sensitive information, and recognizing and responding to security threats. 
  •  All data is encrypted in transit and at rest using strong encryption algorithms. 
  •  We use industry-standard security protocols, such as HTTPS, to protect your data during transmission. 
  •  Access to personal information is limited to authorized personnel who need the information to perform their job duties. We maintain strict access controls and regularly review access permissions. 

Disclosure 

TyMe does not disclose, give, sell, or transfer any personal information about our users, unless required by law or with your explicit consent. We may disclose aggregated, non-personally identifiable information for statistical or research purposes. For example, we may share anonymized and aggregated data with research partners to study trends.

We may disclose your information in the following circumstances: 

  • When required by law: We will disclose your information when required to do so by law, such as in response to a subpoena, court order, or other legal process. We will also disclose your information when we believe in good faith that disclosure is necessary to comply with the law, prevent fraud, or protect our rights, property, or safety, or the rights, property, or safety of others. 
  • With your consent: We may disclose your information to third parties with your explicit consent. For example, if you participate in a program that involves sharing your information with a partner organization, we will obtain your consent before doing so. 
  • To service providers: We may share your information with third-party service providers who perform services on our behalf, such as data hosting, payment processing, and customer support. These service providers are contractually obligated to protect your information and only use it for the purposes for which it was disclosed. 
  • In connection with a business transaction: If we are involved in a merger, acquisition, or sale of all or a portion of our assets, your information may be transferred to the acquiring entity. We will notify you of any such transaction and any changes to this Privacy Policy. 
  • To protect your safety or the safety of others: We may disclose your information if we believe that disclosure is necessary to protect your vital interests or the vital interests of another person, or to prevent serious harm or death. 
  • In aggregated or de-identified form: We may share aggregated or de-identified information with third parties for research, marketing, or other purposes. This information does not identify you individually. 

App Security 

We employ robust security measures to protect the [Your Organization Name] app and its data from unauthorized access and potential threats. These measures include: 

  • Regular Security Assessments: We conduct regular security assessments and audits to identify and address potential vulnerabilities in our systems and processes. These assessments include: 
  • Penetration Testing: We conduct regular penetration testing to simulate real-world attacks and evaluate the effectiveness of our security measures. These tests are performed by both internal security experts and independent third-party security firms. 
  • Vulnerability Scanning: We use automated vulnerability scanning tools to identify common security weaknesses in our software and systems. These scans are performed on a regular schedule and after any significant changes to our app or infrastructure. 
  • Security Code Reviews: Our development processes include rigorous security code reviews to identify potential security flaws before code is deployed. These reviews are performed by trained security engineers. 
  • System Monitoring and Logging: We continuously monitor our systems for suspicious activity and maintain detailed audit logs. These logs record all access to our systems and data, allowing us to detect and respond to security incidents in a timely manner. 
  • Incident Response Plan: We have a comprehensive incident response plan in place to handle any security breaches or incidents. This plan includes procedures for containing the incident, mitigating its impact, recovering lost data, and notifying affected users and relevant authorities, as required by law. 
  • Software Development Security: We follow secure software development lifecycle (SDLC) practices to minimize security risks during the development process. This includes: 
  • Security requirements analysis 
  • Secure design principles 
  • Secure coding practices 
  • Regular security testing throughout the development lifecycle 
  • Data Integrity Measures: We employ measures to ensure the integrity of your data and prevent unauthorized modification. These measures include: 
  • Digital signatures 
  • Checksums 
  • Data validation techniques 
  • Physical Security: Our systems and data are hosted in secure data centers with strict physical access controls. These controls include: 
  • Surveillance cameras 
  • Biometric authentication 
  • 24/7 security personnel 

Your Interaction with Tyme on Third-Party Platforms 

[Detail how user data is handled on third-party platforms. Modify the list below to reflect the platforms your organization uses.*] 

TyMe may interact with you on various third-party websites and applications to communicate and engage with our users. These platforms include: 

Platform 3 Instagram:
If you interact with us on Instagram, Instagram may collect data about your interactions, such as likes, comments, and shares. This data is subject to Instagram’s privacy policy. We do not collect any personally identifiable information from Instagram unless you directly provide it to us in a private message. 

Platform 1 Facebook:
If you interact with us on Facebook, your activity is subject to Facebook’s privacy policy. We do not collect any personally identifiable information from Facebook, but we may use aggregated and anonymized data for analytics and to improve our content on that platform. 

Platform 2 YouTube:
When you view our videos on YouTube, YouTube may collect data about your viewing habits. This data is subject to Google’s privacy policy. We do not have control over the data collected by YouTube, but we take steps to ensure that any information we share on our YouTube channel does not compromise your privacy. 

Cart (0 items)

Create your account