Privacy Policy

Welcome to Avaamo!

Avaamo, Inc. (“Avaamo”) provides this Privacy Policy to inform you of our policies and procedures regarding the collection, use and disclosure of Personally Identifiable Information we receive when you download and use the Avaamo mobile application or use the web client. If you have questions or concerns regarding this Privacy Policy, you should first contact Avaamo at For information about your obligations and use of the Application, please see our Terms of Use policy.

This Privacy Policy may be updated from time to time to reflect new technology, your needs, and business developments. We will notify you of any material changes by posting the new Privacy Policy on the Application. You are advised to consult this Privacy Policy regularly for any changes.

1. Our Policy Towards Children.

Avaamo does not knowingly collect Personally Identifiable Information from children under 13. If a parent or guardian becomes aware that his or her child has provided us with Personally Identifiable Information without their consent, he or she should contact us at If we become aware that a child under 13 has provided us with Personally Identifiable Information (defined below), we will delete such information from our files and disable their account.

2. Definitions.

Before you review this Privacy Policy, we recommend you are familiar with the following concepts and terms so that you can best understand how Avaamo uses data about you and to enhance your experience using the Application.

2.1 We.

“We” is defined as “Avaamo, Inc.”.

2.2 API.

An application programming interface or “API” is a particular set of rules and specifications that allows one software program to access and make use of another software program. It helps facilitate the interaction between applications, similar to the way the user interface facilitates interaction between humans and computers. Avaamo uses APIs to enable programming or other similar third-party technologies, products, or activities available through the Application.

2.3 Cookies and other Tracking Technologies.

Cookies are small text files that web servers typically send to users’ computer when they visit a website. Cookies can be used on mobile applications as well. Cookies can be read or edited when the user loads a website or advertisement from the domain that wrote the cookie in the first place. Cookies are used by companies to collect and send information about a user’s visit – for example, number of visits to the application, average time spent, pages viewed, navigation history through the website, and other statistics. This information can be used to improve a user’s online experience by saving passwords, or allowing companies to track and improve website loading times, for instance. Cookies can also be used to track a user’s browsing or online purchasing habits and to target advertisements to specific users. Cookies cannot be used to access any other data on a user’s mobile device, to personally identify them, or to act like malware or a virus. Users who prefer not to accept cookies on the web can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive. You can read more about cookies at We may also use “pixel tags,” “web beacons,” “clear GIFs” or similar means (individually or collectively “Pixel Tags”) in connection with our Application to collect usage, demographic and geographical location data. A Pixel Tag is an electronic image, often a single pixel that is ordinarily not visible to users and may be associated with cookies on a user’s hard drive. Pixel Tags allow us to count users who have visited certain screens of the Application, to deliver branded Application and to help determine the effectiveness of promotional or advertising campaigns.

2.4 Personally Identifiable Information.

We define personally identifiable information (or “PII”) as “information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.” e. g. name, address, social security number, e-mail address etc. This is the common industry definition used by most Internet companies. Information that is collected by various Internet companies but which does not qualify as PII is call “non-PII.”

Certain Non-Personally Identifiable Information would be considered a part of your Personally Identifiable Information if it were combined with other identifiers (for example, combining your zip code with your street address) in a way that enables you to be identified. However, the same pieces of information are considered Non-Personally Identifiable Information when they are taken alone or combined only with other Non-Personally Identifiable Information (for example, your viewing preferences).

3. Information Collection and Use.

Our primary goals in collecting information are to provide and improve our Application, including communication features and capabilities, to administer your account, and to enable users to enjoy and easily navigate the Application.

3.1 What We Collect.

3.2 Why We Collect Your Information and How We Use It.

3.3 What We Share.

4. Notifications and Other Messages.

We may send you notifications and other messages using the contact information we have for you, like your email address or via the notification structure built in your mobile device’s operating system.

If we make changes to this Privacy Policy we will notify you by publication here.

If the changes are material, we will provide you additional, prominent notice as appropriate under the circumstances.

5. Change of Control.

If the ownership of our business changes, we may transfer your information to the new owner so they can continue to operate the Application. But they will still have to honor the commitments we have made in this Data Use Policy.

6. Aggregate Information and Non-Personally Identifiable Information.

We may share aggregated information that does not include Personally Identifiable Information and we may otherwise disclose Non-Personally Identifiable Information and Log Data with third parties for industry analysis, demographic profiling and other purposes. Any aggregated information shared in these contexts will not contain your Personally Identifiable Information.

7. Service Providers.

We may employ third party companies and individuals to facilitate the Application available therein, to provide the Application on our behalf and to perform Application related to administration of the Application (“Service Providers”). The types of Service Providers we use include, without limitation, Application providers that provide the following types of Application: website and application maintenance, hosting, database management, data analytics and administration. These third parties have access to your Personally Identifiable Information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

8. Compliance with Laws and Law Enforcement.

Avaamo cooperates with government and law enforcement officials and private parties to enforce and comply with the law. We will disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including but not limited to subpoenas), to protect the property and rights of Avaamo or a third party, to protect the safety of the public or any person, or to prevent or stop any activity we may consider to be, or to pose a risk of being, illegal, unethical, inappropriate or legally actionable. We reserve the right to do any of the foregoing.

9. Deleting and Deactivating your Account.

All Users may delete their account. If you choose to delete your account, Avaamo may retain an archive copy of your account information for up to one (1) week after which the content will be fully purged. Avaamo will only retain archive copy for longer than one (1) week if required by law or for legitimate business purposes. Users may delete their accounts by uninstalling the Application. Avaamo may retain an archived copy of your records as required by law or for legitimate business purposes.

10. Contacts.

Avaamo will have access to your contact information on your mobile device as well as in applications you link to the Application such as your email account. Any communication with your contacts, whether or not they are registered users of the Application, will be driven by you. Avaamo will not reach out to your contacts.

11. Security.

Avaamo is very concerned with safeguarding your information. We are not in the business of providing information security. We use our best commercial efforts to employ limited data security measures, such as encryption, on some but not all systems. No method of transmission over the Internet, or method of electronic storage, is 100% secure, however. Therefore, while Avaamo strives to use commercially acceptable means to protect your Personally Identifiable Information, Avaamo cannot guarantee its absolute security. Do not provide your Personally Identifiable Information if you are concerned with its disclosure. We do our best to keep your information secure. We try to keep the Application available, bug-free and safe, but do not make guarantees about any part of our Application.

We will make any legally required disclosures of any breach of the security, confidentiality, or integrity of your unencrypted electronically stored “personal data” (as defined in applicable state statutes on security breach notification) to you via e-mail or conspicuous posting via the Application in the most expedient time possible and without unreasonable delay, insofar as consistent with (i) the legitimate needs of law enforcement or (ii) any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

We store data for as long as it is necessary to provide the Application to you and others, including those described above. Typically, information associated with your account will be kept until your account is deleted. For certain categories of data, we may also tell you about specific data retention practices.

12. International Transfer.

Your information may be transferred to - and maintained on - computers located outside of your state, province, country or other governmental jurisdiction where the privacy laws may not be as protective as those in your jurisdiction. Your consent to this Privacy Policy followed by your submission of such information represents your agreement to transfer of data across servers located in various states and countries.

13. Phishing.

Identity theft and the practice currently known as “phishing” are of great concern to Avaamo. Safeguarding information to help protect you from identity theft is a top priority. We do not and will not, at any time, request your credit card information or national identification numbers in a non-secure or unsolicited e-mail or telephone communication. For more information about phishing, visit the Federal Trade Commission’s website.

14. Your California Privacy Rights.

California law permits residents of California to request certain details about what Personally Identifiable Information a company shares with third parties for the third parties’ direct marketing purposes. Avaamo does not share your information with third parties for the third parties’ own and independent direct marketing purposes unless we receive your permission. If you have questions about our sharing practices or your rights under California law, please write us at

15. Contacting Avaamo.

If you have any questions about the Privacy Policy, please contact Avaamo at