PRIVACY & DATA HANDLING POLICY

Welcome to Freimz, developed by Freimz Group, Our commitment is to provide a safe, secure, and engaging platform prioritizing user privacy and data security at every step.

ARTICLE 1: The Importance of Privacy and Data Protection

In the realm of social networking, the sanctity of personal information is paramount. Our company recognizes the significance of privacy and data protection as fundamental rights of every user. Amidst an environment of pervasive digital footprints, our unwavering commitment is to uphold the highest standards of privacy and data integrity. This commitment transcends mere legal obligations, embodying the core tenet of our trust pact with our users.

1.1 Foundational Principles

Our privacy framework is constructed on the pillars of transparency, accountability, and user control. We champion the belief that users should have unequivocal visibility and dominion over their personal information. This includes providing lucid, accessible information regarding our practices on data collection, utilization, storage, and dissemination.

1.2 Compliance with Global Standards

Our adherence to international data protection regulations is stringent and unwavering. Our policies and operational practices are meticulously crafted to meet, and where possible, exceed the mandates of global data protection frameworks. This includes, but is not limited to, the General Data Protection Regulation (GDPR), Personal Information Protection and Electronic Documents Act (PIPEDA), and the California Consumer Privacy Act (CCPA).

1.3 Data Minimization and Security

Embracing the principle of data minimization, our approach ensures that only the information essential for the provision of our services is collected. To safeguard this data against unauthorized access or breaches, we deploy state-of-the-art security measures. These measures undergo regular scrutiny and enhancement to counteract evolving cyber threats, ensuring the fortress-like protection of user data.

1.4 User Empowerment

Empowerment of our users is central to our privacy ethos. We furnish our users with robust tools to manage their privacy preferences effectively. This empowerment includes options to access, review, correct, or delete their personal information, alongside the capability to adjust privacy settings as per their discretion. Moreover, we provide avenues for users to opt-out of specific data processing activities, aligning seamlessly with their legal rights.

1.5 Ethical Data Stewardship

As ethical stewards of personal information, our pledge to responsible data handling is unwavering. Any sharing of information is conducted under stringent agreements, ensuring the preservation of privacy as per this policy. Importantly, we stand firmly against the sale of user data to third parties for marketing purposes without explicit user consent.

1.6 Ongoing Engagement and Education

Our commitment to privacy extends beyond policy into active engagement and education of our users regarding privacy matters. We strive to keep our users informed about privacy-related issues, potential risks, and strategies for mitigation. Our communication channels are always open for users to express queries, suggestions, or voice concerns about privacy.

ARTICLE 2: Scope and Consent

2.1 Universal Applicability

Our Privacy Policy is designed to be inclusive, covering every user who engages with our platform. Whether our users hail from regions with stringent data protection laws or from locales with more nascent privacy frameworks, our commitment remains unwavering. We strive to not only comply with local laws but also to provide a consistent level of protection for personal data worldwide.

2.2 Consent by Use

By accessing, browsing, or using our app, users explicitly signal their consent to the terms outlined within our Privacy Policy. This consent is indicative of the user's agreement to the collection, processing, and sharing of their personal information as described in our policy. It's imperative for users to review this policy thoroughly to understand their rights and our obligations.

2.2.1 Informed Consent

We take significant measures to ensure that consent is fully informed. Prior to collecting any personal information, we provide clear, concise information about the specifics of the data being collected, the purpose behind the collection, and how it will be used or shared. Our aim is to empower users with the knowledge to make informed decisions regarding their personal data.

2.2.2 Revocation of Consent

Understanding that consent is a dynamic preference, we offer users the ability to revoke their consent at any time. This revocation can pertain to specific types of data processing activities or the use of the app in its entirety. Upon revocation, we will cease the processing of the user's personal information for the specified purposes, respecting the user's wishes.

2.3 Consent for Cross-Border Data Transfers

In cases where personal information is transferred across borders, we ensure that such transfers are conducted in compliance with applicable data protection laws. Users consenting to our Privacy Policy thereby agree to such cross-border transfers, understanding that their data may be processed in countries with different privacy protections than their own. We take all necessary precautions to ensure that data transfers are secure and that user information remains protected according to the standards outlined in our policy.

ARTICLE 3: Information Collection

Our primary goal in collecting personal information is to enhance user experience, provide personalized services, and ensure the smooth operation of our app.

3.1 Types of Personal Information Collected

3.1.1 Basic Personal Details

This includes, but is not limited to, the user's name, age, email address, and gender. These details are fundamental to creating a personalized user profile.

3.1.2 Contact Information

Contact details such as phone numbers and email addresses are collected to facilitate communication and provide support.

3.1.3 Location Data

Geographical information is used to tailor user experiences by suggesting matches or content relevant to the user's locale.

3.1.4 Usage and Preference Data

This encompasses information on how users interact with the app, including app usage patterns, preferences in matches, and settings chosen within the app.

3.1.5 Social Media Integration

For users opting to integrate their social media accounts, we collect information such as profile pictures, relationship status, and friend lists to enhance the user experience.

3.1.6 Device Information

We collect limited information about the devices used to access our app, including device ID, device model, IP address, geolocation data, to enhance the app functionality and user experience. This data helps us understand user behavior and optimize our services accordingly.

3.1.7 Biometric Verification

For users opting into our face verification feature, please note that we do not store biometric information. This feature is designed to verify in real-time if the person on the camera is a real person. This process is conducted without storing any biometric data to ensure user privacy and security.

3.1.8 Phone Verification

Users who opt into our phone verification feature will have their phone numbers collected. This information is used solely for the purpose of verifying the user's identity and enhancing account security.

3.2 Methods of Collection

3.2.1 Account Registration

Information is collected directly from users upon the creation of an account to provide access to our app's features.

3.2.2 User Input

Data is collected through user interactions with the app, such as when users update their profile, set preferences, or communicate with matches.

3.2.3 Social Media Integration

Users may choose to link their social media accounts, allowing us to collect information from these platforms in accordance with user permissions.

3.2.4 Automated Technologies

We use cookies and similar technologies to collect data on how users navigate and interact with our app, aiding in personalization and app improvement.

ARTICLE 4: Use of Information

The information collected is utilized to deliver and enhance our services, ensuring a secure, efficient, and personalized user experience. Below are the key purposes for which user data is processed.

4.1 App Functionality and Personalization

4.1.1 Service Provision

Personal information is crucial for the operation of the app, enabling features such as user profiles, match suggestions, and communication tools.

4.1.2 Personalization

Data regarding user preferences and app interactions is used to personalize the user experience, including personalized match suggestions and content.

4.2 Security Measures

4.2.1 Account Security

Information is used to verify user identity, protect against unauthorized access to user accounts, and ensure the safety and security of our platform.

4.2.2 Data Integrity

We implement measures to ensure the accuracy and integrity of personal information, safeguarding it from unauthorized modification.

4.3 Data Processing for Matching Algorithms

4.3.1 Algorithmic Matching

Collected data, especially regarding user preferences, behaviors, and location, is processed through our proprietary algorithms to suggest potential matches that align with user interests and criteria.

4.3.2 Continuous Improvement

Feedback and interaction data are analyzed to continually refine and enhance the accuracy of our matching algorithms, ensuring relevance and effectiveness in match suggestions.

ARTICLE 5: Information Sharing and Disclosure

Our commitment to maintaining the confidentiality and integrity of your personal information is unwavering. This commitment informs our approach to sharing and disclosing user information, ensuring transparency and adherence to legal and ethical standards.

5.1 Conditions for Sharing and Disclosure

5.1.1 User Consent and Preferences

We place the utmost importance on user consent. Personal information is shared with third parties only after obtaining explicit consent from you, the user. This consent-based sharing is integral to our commitment to empowering users, ensuring you have full control over your personal data and its use.

5.1.2 Operational Necessity and Service Enhancement

To optimize the functionality and performance of our services, we collaborate with trusted third-party service providers. These entities support a broad spectrum of operational needs, including analytics, cloud storage, customer support, and payment processing. Each provider is rigorously vetted and bound by contractual obligations that enforce strict data privacy and security measures, mirroring or exceeding our own standards.

5.1.3 Legal Obligations and Compliance

We may be compelled to disclose user information in response to lawful requests by public authorities, including meeting national security or law enforcement requirements. Such disclosures are made in strict compliance with applicable laws and regulations, ensuring that the scope of information disclosed is limited to what is legally required.

5.1.4 Corporate Transactions

In the context of significant business events such as mergers, acquisitions, divestitures, or asset sales, user information may constitute part of the transferred assets. We commit to maintaining the privacy of your information in such transactions and will notify affected users before personal information is transferred or becomes subject to a different privacy policy.

5.2 Recipient Categories

5.2.1 Third-Party Service Providers

Our network of third-party service providers includes specialists in secure data processing, cyber security, payment processing, customer engagement, and marketing analytics. These entities are carefully selected based on their commitment to privacy and security. We share with them only the information necessary for the provision of their services, and we enforce strict data protection agreements to safeguard user privacy.

5.2.2 Legal and Regulatory Authorities

We cooperate with government and law enforcement requests for information as required under law. This cooperation may involve sharing data to protect against fraud, comply with legal investigations, or for public safety purposes. In all such instances, our legal team rigorously evaluates each request to ensure it complies with the law and is limited in scope.

5.2.3 Affiliates and Subsidiaries

To streamline operations and deliver cohesive services, we may share information within our family of companies. This intra-company sharing is governed by the same privacy principles that apply to all our data handling practices, ensuring consistency in user data protection across all entities.

5.2.4 Analytics and Advertising Partners

To enhance our marketing efforts and improve service delivery, we engage with analytics and advertising partners. These partnerships enable us to understand user preferences and behavior better, facilitating targeted advertising and content personalization. These entities operate under stringent data privacy conditions, ensuring anonymization and data protection in line with industry best practices.

5.3 Detailed Disclosure Practices

Our approach to information sharing and disclosure is characterized by meticulous attention to detail, prioritizing user privacy and data security at every turn. We employ advanced encryption and anonymization techniques where possible to minimize risks. Furthermore, we are committed to ongoing dialogue with our users about our privacy practices, providing regular updates and transparency reports to foster trust and accountability.

ARTICLE 6: Cross-Border Data Transfers

In the interconnected realm of digital services, our platform operates on a global scale, necessitating the transfer of user data across international boundaries.

6.1 Framework for Cross-Border Data Transfer

6.1.1 Adherence to Global Privacy Laws

We rigorously align our cross-border data transfer mechanisms with globally recognized privacy laws and standards, such as the GDPR in Europe, the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada, and others, ensuring a high level of data protection across borders.

6.1.2 Legal Instruments and Mechanisms

For the lawful transfer of personal data outside of its country of origin, we rely on various legal instruments, including but not limited to Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs) for intra-group transfers, and adherence to frameworks such as the EU-U.S. Privacy Shield (where still applicable) and its potential successors. These legal mechanisms obligate all data recipients to uphold privacy standards equivalent to those required in the user's home country.

6.2 Ensuring Data Protection Across Borders

6.2.1 Implementation of Advanced Security Measures

To safeguard data integrity and confidentiality during and after transfer, we employ advanced encryption technologies and secure transfer protocols. Our security infrastructure is designed to protect data against unauthorized access, disclosure, alteration, and destruction.

6.2.2 Rigorous Vendor and Partner Assessments

We conduct thorough due diligence of all third-party service providers and international partners to ensure their data handling practices comply with our stringent data protection standards. Data Processing Agreements (DPAs) are executed, mandating the adherence to these standards and the implementation of adequate technical and organizational measures to protect your data.

6.2.3 Regular Audits and Compliance Reviews

Our commitment to cross-border data transfer compliance includes regular audits and reviews of our data transfer practices and those of our partners. These audits are designed to ensure ongoing compliance with evolving data protection laws and to address any potential vulnerabilities promptly.

ARTICLE 7: Data Retention and Deletion

The stewardship of your personal data is a responsibility we take seriously, adopting a principled approach to data retention and ensuring users have comprehensive control over their personal information. This ARTICLE provides detailed insights into our data retention and deletion protocols.

7.1 Data Retention Practices

7.1.1 Determination of Retention Periods

Our data retention schedules have been updated to reflect that user information is retained for up to 2 months after account closure, whether initiated by the user or by our administrators. This is to ensure data availability for potential investigations of any harm or unlawful activities associated with the account.

7.1.2 Review and Minimization of Data Retention

We periodically review our data retention practices to ensure data is not retained longer than necessary. This process involves evaluating the continued relevance of the information to our service offerings, legal compliance, and the possibility of data minimization through anonymization or pseudonymization where feasible.

7.2 Empowering Users with Data Deletion Rights

7.2.1 Procedures for Requesting Data Deletion

We provide users with straightforward mechanisms to request the deletion of their personal data. Such requests can be made through the user's account settings or by contacting our dedicated privacy support team. Upon verification of the user's identity, we proceed with the deletion process, ensuring the comprehensive eradication of the user's personal information from our active systems and, where possible, our backups.

7.2.2 Handling Exceptions to Data Deletion Requests

There are circumstances under which we might be unable to fulfill a deletion request entirely due to legal, regulatory, or security obligations. In such cases, we transparently communicate the rationale to the user, detailing the specific data elements that must be retained, the legal basis for such retention, and the anticipated timeline until final deletion can occur.

7.2.3 Secure Deletion Process

Our data deletion protocols are designed to ensure the secure and irreversible removal of personal information. This includes the deployment of measures to prevent data recovery and the elimination of any residual data from our systems in alignment with best practices in data security and privacy.

ARTICLE 8: User Rights and Control

In our ongoing commitment to privacy and data protection, we recognize and empower our users with a comprehensive set of rights over their personal data. This ARTICLE outlines these rights and the mechanisms available for users to exercise them, ensuring transparency, control, and respect for user privacy.

8.1 Enumeration of User Rights

8.1.1 Right to Access

Users have the right to request access to their personal data held by us, obtaining a copy of the data and information on how it is being used and shared.

8.1.2 Right to Correction

Should personal data be inaccurate or incomplete, users are entitled to have it corrected or completed without undue delay.

8.1.3 Right to Erasure (Right to be Forgotten)

Users can request the deletion of their personal data when it is no longer necessary for the purposes for which it was collected, among other grounds.

8.1.4 Right to Data Portability

This right allows users to receive their personal data in a structured, commonly used, and machine-readable format and to transmit that data to another controller.

8.1.5 Right to Restrict Processing

Users have the right to restrict the processing of their personal data under certain conditions, such as when the accuracy of the data is contested.

8.1.6 Right to Object

Users can object to the processing of their personal data based on their particular situation, including processing for direct marketing purposes.

8.2 Exercising Your Rights

8.2.1 Contact Channels for Exercising Rights

We provide dedicated channels, including an online privacy center and customer support, through which users can submit requests to exercise their rights. Detailed instructions and assistance are available to guide users through the process.

8.2.2 Verification and Response

Upon receiving a request, we undertake to verify the identity of the requester to protect user data from unauthorized access. We commit to responding to requests within the time frames prescribed by applicable data protection laws, providing a comprehensive reply and taking the necessary action as requested by the user.

8.2.3 Support and Guidance

Our privacy support team is available to offer assistance and answer any questions users may have about their rights and how to exercise them. We also provide resources and tutorials aimed at educating users about their privacy rights and controls available within the app.

ARTICLE 9: Cookies and Tracking Technologies

Our platform employs cookies and similar tracking technologies to enhance user experience, provide personalized services, and analyze app performance.

9.1 Use of Cookies and Similar Technologies

9.1.1 Purpose and Functionality

Cookies and similar technologies are used to remember user preferences, understand app usage patterns, and tailor advertisements to user interests. They also facilitate session management and security features.

9.1.2 Types of Cookies Used

  • Strictly Necessary Cookies: Essential for the operation of our services, enabling basic functions like page navigation and access to secure areas.
  • Performance Cookies: Collect information about how users interact with our app, helping us improve functionality and user experience.
  • Functional Cookies: Remember choices users make (such as language or region) and provide enhanced, personalized features.
  • Targeting/Advertising Cookies: Used to deliver advertisements more relevant to users and their interests, as well as to limit the number of times an ad is shown.

9.2 Controlling Cookies and Tracking Technologies

9.2.1 User Preferences and Consent

Upon first use of our app, users are presented with a cookie consent banner where they can customize their preferences. Users can choose to accept all cookies, reject non-essential cookies, or customize their settings according to their preferences.

9.2.2 Managing Cookies in Browser Settings

Users can also manage cookie settings through their web browser, including removing and blocking cookies. Most browsers provide options to refuse cookies and to delete cookies already stored on your device.

9.2.3 Impact of Disabling Cookies

It's important for users to understand that disabling cookies may affect the functionality of our app and limit access to certain features designed to enhance the user experience.

ARTICLE 10. Security Measures

10.1 Security Protocols

10.1.1 Encryption: Our commitment to data security begins with encryption protocols such as SSL/TLS (Secure Sockets Layer/Transport Layer Security), which ensure that all data transmitted between users' devices and our servers is encrypted. This encryption guarantees that user data remains confidential and secure during transit, protecting it from interception or unauthorized access by malicious actors.

10.1.2 Access Controls: Access to sensitive user data is strictly regulated and limited to authorized personnel only. We implement robust access controls, including multi-factor authentication and role-based access management, to ensure that only individuals with legitimate reasons can access specific data. This stringent control mechanism minimizes the risk of unauthorized access and internal threats.

10.1.3 Data Encryption at Rest: In addition to encrypting data during transmission, we also employ encryption mechanisms to safeguard user data stored within our databases. By encrypting data at rest, we ensure that even if unauthorized individuals gain access to our database servers, the data remains unreadable and unusable, thereby maintaining its integrity and confidentiality.

10.1.4 Regular Security Audits: Our commitment to security extends to regular audits and assessments conducted by independent third-party security experts. These audits are designed to identify potential vulnerabilities or weaknesses in our systems and infrastructure proactively. By staying vigilant and proactive, we continuously enhance our security measures to adapt to evolving threats and protect user data effectively.

10.2 Response to Data Breaches

In the unfortunate event of a data breach, we have comprehensive incident response protocols in place to minimize the impact on users and swiftly mitigate the breach. Our response strategy includes:

  • Immediate Investigation: Upon detection of a breach, we initiate a thorough investigation to determine the scope, cause, and extent of the breach. This investigation involves analyzing logs, identifying compromised systems, and assessing the potential impact on user data.
  • Notification: We adhere to applicable data breach notification laws and regulations by promptly notifying affected users, regulatory authorities, and other relevant stakeholders about the breach. Transparent communication is essential to maintain trust and keep users informed about the steps we are taking to address the situation.
  • Remedial Measures: Following a breach, we implement remedial measures to address the vulnerabilities exploited in the attack and prevent similar incidents in the future. This may involve patching security flaws, strengthening access controls, or enhancing monitoring capabilities to detect and respond to threats more effectively.

ARTICLE 11. Special State Terms (US-specific Provisions)

11.1 New York

  • Guarantee of Referrals: While we do not guarantee a specific number of "referrals," users have the functionality to view profiles as desired, enhancing flexibility and user control over their experience.
  • Subscription Hold: Subscribers in New York have the option to place their subscription on hold for up to one year upon providing written notice to Match Group Legal, offering added flexibility and convenience.
  • Access to Information: Users can access detailed information about how their data is utilized and managed by referring to our Privacy Policy, ensuring transparency and accountability regarding data handling practices.
  • Consumer Bill of Rights: New York residents can review the New York Dating Service Consumer Bill of Rights for additional insights into their rights and protections as users of our services.

11.2 North Carolina

  • Buyer's Rights: Users in North Carolina have specific rights outlined in the North Carolina Buyer's Rights, which provide important information and protections tailored to residents of the state.

11.3 Illinois, New York, North Carolina, and Ohio

  • Service Availability: Our services are widely available throughout the United States. Users who relocate outside the service area of our platform can contact us to explore alternative service options or request a refund, ensuring continuity of service and customer satisfaction.

ARTICLE 12. International Considerations

12.1 GDPR Compliance

12.1.1 GDPR Compliance for EU Users

Our commitment to data protection and privacy extends beyond the boundaries of the European Union, embracing a global perspective on user privacy. In accordance with the General Data Protection Regulation (GDPR), we ensure that all personal data processing activities involving EU residents are conducted with the utmost respect for privacy and in strict compliance with GDPR mandates. This includes adhering to principles such as data minimization, purpose limitation, accuracy, storage limitation, and integrity and confidentiality.

We recognize the importance of providing EU users with enhanced rights under GDPR, such as the right to access, rectify, erase, and port their data, as well as the right to object to and restrict its processing. Our policies and procedures are designed to facilitate the exercise of these rights, ensuring that EU users can maintain control over their personal information.

12.1.2 California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) Compliance

In parallel with our GDPR compliance efforts, we give special attention to adhering to the requirements of the California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA). This legislative framework sets forth rigorous data privacy standards, providing California residents with unprecedented rights over their personal information.

Our Privacy Policy has been carefully crafted to align with the CCPA/CPRA's comprehensive data protection principles. This includes clear communication about the categories of personal information collected, the purposes for which it is used, and the rights California residents have in relation to their personal data. These rights include, but are not limited to, the right to know about the personal information collected, the right to delete personal information, the right to opt-out of the sale of personal information, and the newly introduced rights under CPRA such as the right to correct inaccurate data and the right to limit the use and disclosure of sensitive personal information.

Our policy details the specific data retention rules and constraints as prescribed by the CCPA/CPRA, ensuring that our data handling practices are in strict compliance with California's data protection standards. We undertake rigorous assessments to ensure our data retention policies reflect the minimum necessary period for holding personal information, after which it is securely deleted or anonymized.

12.2 Adaptations for Canadian Data Protection Laws

In accordance with Canadian data protection laws, including the Personal Information Protection and Electronic Documents Act (PIPEDA), we ensure that the collection, use, and disclosure of personal information of Canadian users is governed by the following principles:

  • Consent: We obtain meaningful consent from Canadian users before collecting, using, or disclosing their personal information, except where permitted or required by law.
  • Limited Collection: We limit the collection of personal information to purposes that a reasonable person would consider appropriate under the circumstances, as required by PIPEDA.
  • Accountability: We are accountable for the protection of personal information under our control, including information that may be transferred to third-party service providers or stored internationally.
  • User Access: Canadian users have the right to access their personal information held by us, request corrections, and address any concerns regarding its accuracy and completeness.

12.3 Specific Adjustments for Other Regions

In addition to GDPR compliance for EU users and adaptations for Canadian data protection laws, we make specific adjustments to our privacy practices to comply with the requirements of other regions where our services are offered. These adjustments may include:

  • Compliance with local data protection laws and regulations applicable to the respective regions.
  • Tailoring our privacy practices to align with the cultural and legal norms of specific countries or jurisdictions.
  • Providing additional transparency and disclosures regarding data processing activities, rights, and protections afforded to users in these regions.

ARTICLE 13. Changes to the Privacy Policy

13.1 Process for Updating the Policy

Our Privacy Policy is subject to periodic review and updates to ensure that it remains accurate, comprehensive, and compliant with evolving legal requirements and industry standards. The process for updating the policy includes:

  • Regular Assessment: We conduct regular assessments of our privacy practices, data processing activities, and legal obligations to identify any changes or developments that may necessitate updates to the Privacy Policy.
  • Legal Compliance: We monitor changes to relevant laws, regulations, and guidelines related to data protection and privacy to ensure that our policy reflects the latest legal requirements.
  • Stakeholder Input: We may seek input from stakeholders, including users, data protection authorities, legal experts, and industry groups, to gather feedback and insights that inform the policy updates.
  • Internal Review: Our legal and compliance teams collaborate to review proposed changes to the Privacy Policy, ensuring alignment with our internal policies, values, and commitments to user privacy and data protection.

13.2 How Users Will Be Informed of Changes

We are committed to transparency and communication regarding changes to our Privacy Policy. When updates are made, we inform users in the following ways:

  • Notification: We provide prominent notifications within our app, website, or other relevant platforms to alert users to the changes in the Privacy Policy. These notifications may include pop-up messages, banners, or prompts directing users to review the updated policy.
  • Email Communication: For registered users who have provided their email addresses, we may send notifications via email informing them of the changes to the Privacy Policy and providing a summary of the key updates.
  • Effective Date: We clearly indicate the effective date of the updated Privacy Policy to inform users of when the changes come into effect. This allows users to understand which version of the policy applies to their use of our services.
  • Consent Mechanism: In cases where changes to the Privacy Policy require user consent, such as material changes to data processing practices or user rights, we obtain explicit consent from users before implementing the changes.

ARTICLE 14. Contact Information

14.1 How Users Can Contact Us for Privacy Concerns

We understand the importance of addressing privacy concerns promptly and transparently. Users can contact us for privacy-related inquiries, requests, or concerns through the following channels:

  • Support Center: Our support center provides a dedicated channel for users to submit privacy inquiries or requests for assistance. Users can access the support center through the app or website and submit their queries via email (support@Freimz.com) or support ticket.
  • Direct Communication: Users may also contact us directly via the following email address: legal@Freimz.com.
    We encourage users to include "Privacy Inquiry" or a similar identifier in the subject line or correspondence to expedite the handling of their inquiry.

14.2 Legal Department Contact

For privacy-related inquiries or concerns that require legal attention, users can contact our legal department directly online at legal@Freimz.com. Our legal team is available to address any questions or issues regarding our privacy practices and user data handling for Freimz or other apps developed by Freimz® Group.

ARTICLE 15. Effective Date and Acknowledgment

15.1 Effective Date of the Policy

The current version of the Privacy Policy for Freimz becomes effective as of 15th Feb 2024, indicating the date from which the terms and provisions outlined in the policy apply to users' use of Freimz services.