At Halo, we are dedicated to safeguarding the privacy and security of our users' personal data. This Privacy Policy outlines how we collect, use, and protect your information, as well as detailing your rights regarding your data. By using our services, you agree to the terms outlined in this policy.
​
1. Collection of Personal Data:
We could need to gather personal data, including your birthplace, date, and time, in order to provide our services. Only our service duties to you or legal requirements will be satisfied by this gathering. Direct access to you or through a third party you have given permission to share it with us are two possible sources for this information. We may collect such information directly from you.
​
2. How do we use the information:
Based on the user's particular birth details, the information gathered will be used to provide tailored insights and advice. This customized method seeks to improve the user's comprehension of their inherent abilities, obstacles, and possibilities, enabling a more knowledgeable and thoughtful life navigation. We handle personal data in order to give users insight into their underlying decision-making processes. Our goal is to enable more rewarding and aligned choice results by matching our services with the user's innate decision-making tendencies. The application additionally makes use of gathered data to inform users on their relationship patterns and interpersonal interactions. By better understanding emotional needs and communicating more effectively, this insight seeks to support relationship management in both personal and professional contexts. Our services are intended to promote personal growth and self-discovery by identifying areas that are lacking. Personal information is also utilized to provide consumers with Human Design-tailored advice on stress management and wellbeing enhancing techniques. We seek to support the user's general mental, emotional, and physical well-being by offering tailored recommendations on appropriate settings and stress-reduction techniques. We are allowed to use your e-mail to send you updates in regards of the halo and aura app.
​
3. Data Security:
As part of our dedication to protecting the privacy, availability, and integrity of the personal data that our users entrust to us, we put strict data security procedures into practice. We use Advanced Encryption Standard (AES) 256-bit encryption, which is a widely accepted industry standard for data security, as the foundation of our security approach. Data is rendered unreadable by unauthorized users through the use of encryption, guaranteeing that private data is safe while in transit and while it is stored on our systems. Its secrecy and integrity are preserved because only individuals who are allowed and have the required cryptographic keys can access and decrypt this data.
​
4. Data Security:
To further prevent unauthorized access, disclosure, alteration, or destruction of personal data, we have implemented comprehensive security measures in addition to our adoption of AES-256 encryption. Among these precautions are strong access control methods, frequent security evaluations to find and fix vulnerabilities, and continuous system monitoring to quickly identify and address possible security events. In addition to implementing strict training programs to guarantee that our employees are knowledgeable about the best practices for managing and safeguarding sensitive data, we are committed to data security even beyond technology solutions. We utilize Shared Preferences, a lightweight storage system that stores and retrieves key-value pairs, to efficiently manage user sessions and preserve preferences. The user experience is made seamless and customized with this technique, which is ideal for managing user preferences, settings, and session data.
5. Data Processing:
Hive, a local database solution with a reputation for speed and efficiency, is used in parallel by our application to handle more complicated data storage needs. Big data persistence is something that Hive excels at, especially when it comes to handling and storing massive amounts of data offline. By doing this, you can be confident that user data—personal, application, and operational data, among other things—is permanently saved on the device. By utilizing encryption and other security mechanisms, Hive's architecture is built to protect data integrity and privacy. We are committed to protecting user privacy and data security, as evidenced by the way our program is designed to integrate Hive and Shared Preferences. Through the use of these technologies, we guarantee safe, effective, and user-centered data processing and sharing within the application. Additionally, all data processing operations in our application comply with applicable data protection laws and regulations thanks to our stringent data handling standards.
6. Transferring Outside EU:
We maintain a strict policy for the handling and distribution of user data in accordance with our unwavering commitment to user privacy and data protection. In particular, we don't give any user information to companies based outside of the European Union (EU). Our commitment to abiding by the strict privacy laws and guidelines set forth by the European Union, particularly the General Data Protection Regulation (GDPR), is the foundation of this policy.
​
7. Use of Cookies:
It's also crucial to remember that cookies are not necessary for our program to function. Our program has been carefully built to respect user privacy by doing away with the need for cookies, in contrast to many digital services that depend on them for various functionality including user monitoring, session management, and tailored advertising. This strategy demonstrates our dedication to privacy by design by guaranteeing that user interactions with our application are safe, private, and free from any kind of tracking or monitoring that is not requested.
8. Rights of user
8.1. User Entitlements within GDPR
-
Access Requests (Article 15): This provision entitles you to inquire about the personal data we hold about you. This includes confirming whether we possess your data, providing a copy of it, and outlining its usage as per our Privacy Policy. It empowers you to verify the lawfulness of our data processing.
-
Rectification Right (Article 16): You have the right to request corrections to any inaccuracies or incompleteness in your personal data held by us. This ensures that our records reflect your accurate and current information.
-
Right to Erasure (Article 17): Commonly known as the "right to be forgotten," this empowers you to request the deletion of your personal data when its continued processing is unnecessary. This gives you control over the retention of your personal information by data controllers.
-
Processing Limitation Right (Article 18): Under certain circumstances, you can request the restriction of processing of your personal data. For example, if you dispute the accuracy of your data or if the processing is unlawful, granting you more control over how your data is handled.
-
Data Portability Right (Article 20): This right allows you to obtain and reuse your personal data in a machine-readable format across different services. It enables easy movement, copying, or transfer of your data between IT environments, enhancing your control and mobility.
-
Objection Right (Article 21): You have the right to object to the processing of your personal data, including profiling and direct marketing activities. This allows you to challenge data processing for specific purposes, ensuring your interests and freedoms are considered alongside data controllers' interests.
-
Children's Data Processing: We commit to following the guidelines in Article 8 of the GDPR regarding children's data. Therefore, we recognize the importance of parental consent for processing a child's personal information. The default age for parental consent under GDPR is sixteen, although member states may lower this to thirteen. Before processing any personal data of children under the age of sixteen for whom our services are intended, we will obtain parental consent. During this process, parents or legal guardians will receive clear information about the data's nature in an open and transparent manner.
8.2. Rights under the CCPA:
As outlined in the California Consumer Privacy Act (CCPA), individuals are endowed with specific rights enshrined within the legislation. These rights are delineated across various sections of the CCPA:
-
Notification Right: Individuals are entitled to receive notifications regarding the collection of their personal information, as mandated by CCPA sections 1798.100 and 1798.120.
-
Access Right: Individuals possess the right to request access to precise details concerning the personal information gathered by a business. This encompasses data categories, sources, purposes, and disclosures to third parties, as delineated in CCPA sections 1798.100, 1798.110, and 1798.115.
-
Opt-Out Right: Individuals retain the right to opt out of the sale of their personal information to third parties at any time, as articulated in CCPA section 1798.120.
-
Deletion Request Right: Individuals have the ability to request the deletion of personal information collected from them, subject to specific exceptions outlined in CCPA section 1798.105.
-
Right to Equal Services and Prices: Businesses are prohibited from discriminating against individuals based on their exercise of CCPA rights, as explicitly stated in CCPA section 1798.125.
-
Compliance Assurance: We will ensure compliance with CCPA section 1798.120 by securing parental consent for any form of data processing involving children under 13 years old.
Contact Information:
For any inquiries or assistance, please feel free to reach out to us using the following contact details:
Email:
contact@auramatching.com
​
Address:
530-B Harkle Road
Santa Fe
NM 87505
USA
Devicion LLC
We are available during our business hours to address your questions, concerns, or feedback. Thank you for contacting us.