Privacy Policy & Terms Of Conditions

Privacy Policy

TOS is subject to change at any time with out any notice, any partnerships we have that deals with privacy of any persons data will be provisioned here.

Privacy Policy For Cindy's Mighty Hands Massage App

Mike V built the Cindy's Mighty Hands Massage app as a Free app. This SERVICE is provided by Mike V at no cost and is intended for use as is.

This page is used to inform visitors regarding my policies with the collection, use, and disclosure of Personal Information if anyone decided to use my Service.

If you choose to use my Service, then you agree to the collection and use of information in relation to this policy. The Personal Information that I collect is used for providing and improving the Service. I will not use or share your information with anyone except as described in this Privacy Policy.

The terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, which is accessible at Cindy's Mighty Hands Massage unless otherwise defined in this Privacy Policy.

Information Collection and Use

For a better experience, while using our Service, I may require you to provide us with certain personally identifiable information. The information that I request will be retained on your device and is not collected by me in any way in most cases

The app does use third party services that may collect information used to identify you.

Link to privacy policy of third party service providers used by the app

Log Data

I want to inform you that whenever you use my Service, in a case of an error in the app I collect data and information (through third party products) on your phone called Log Data. This Log Data may include information such as your device Internet Protocol (“IP”) address, device name, operating system version, the configuration of the app when utilizing my Service, the time and date of your use of the Service, and other statistics.

Cookies

Cookies are files with a small amount of data that are commonly used as anonymous unique identifiers. These are sent to your browser from the websites that you visit and are stored on your device's internal memory.

This Service does not use these “cookies” explicitly. However, the app may use third party code and libraries that use “cookies” to collect information and improve their services. You have the option to either accept or refuse these cookies and know when a cookie is being sent to your device. If you choose to refuse our cookies, you may not be able to use some portions of this Service.

Service Providers

I may employ third-party companies and individuals due to the following reasons:

  • To facilitate our Service;

  • To provide the Service on our behalf;

  • To perform Service-related services; or

  • To assist us in analyzing how our Service is used.

I want to inform users of this Service that these third parties have access to your Personal Information. The reason is to perform the tasks assigned to them on our behalf. However, they are obligated not to disclose or use the information for any other purpose.

Security

I value your trust in providing us your Personal Information, thus we are striving to use commercially acceptable means of protecting it. But remember that no method of transmission over the internet, or method of electronic storage is 100% secure and reliable, and I cannot guarantee its absolute security.

Links to Other Sites

This Service may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by me. Therefore, I strongly advise you to review the Privacy Policy of these websites. I have no control over and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

Children’s Privacy

These Services do not address anyone under the age of 13. I do not knowingly collect personally identifiable information from children under 13. In the case I discover that a child under 13 has provided me with personal information, I immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact me so that I will be able to do necessary actions.

Changes to This Privacy Policy

I may update our Privacy Policy from time to time. Thus, you are advised to review this page periodically for any changes. I will notify you of any changes by posting the new Privacy Policy on this page.

This policy is effective as of 2021-01-27

Contact Us

If you have any questions or suggestions about my Privacy Policy, do not hesitate to contact me at micknowsbest@gmail.com.

This privacy policy page was created at privacypolicytemplate.net and modified/generated by App Privacy Policy Generator


Terms & Conditions

Terms & Conditions

By downloading or using the app, these terms will automatically apply to you – you should make sure therefore that you read them carefully before using the app. You’re not allowed to copy, or modify the app, any part of the app, or our trademarks in any way. You’re not allowed to attempt to extract the source code of the app, and you also shouldn’t try to translate the app into other languages, or make derivative versions. The app itself, and all the trade marks, copyright, database rights and other intellectual property rights related to it, still belong to Mike V.

Mike V is committed to ensuring that the app is as useful and efficient as possible. For that reason, we reserve the right to make changes to the app or to charge for its services, at any time and for any reason. We will never charge you for the app or its services without making it very clear to you exactly what you’re paying for.

The Cindy's Mighty Hands Massage app stores and processes personal data that you have provided to us, in order to provide my Service. It’s your responsibility to keep your phone and access to the app secure. We therefore recommend that you do not jailbreak or root your phone, which is the process of removing software restrictions and limitations imposed by the official operating system of your device. It could make your phone vulnerable to malware/viruses/malicious programs, compromise your phone’s security features and it could mean that the Cindy's Mighty Hands Massage app won’t work properly or at all.

The app does use third party services that declare their own Terms and Conditions.

Link to Terms and Conditions of third party service providers used by the app

You should be aware that there are certain things that Mike V will not take responsibility for. Certain functions of the app will require the app to have an active internet connection. The connection can be Wi-Fi, or provided by your mobile network provider, but Mike V cannot take responsibility for the app not working at full functionality if you don’t have access to Wi-Fi, and you don’t have any of your data allowance left.

If you’re using the app outside of an area with Wi-Fi, you should remember that your terms of the agreement with your mobile network provider will still apply. As a result, you may be charged by your mobile provider for the cost of data for the duration of the connection while accessing the app, or other third party charges. In using the app, you’re accepting responsibility for any such charges, including roaming data charges if you use the app outside of your home territory (i.e. region or country) without turning off data roaming. If you are not the bill payer for the device on which you’re using the app, please be aware that we assume that you have received permission from the bill payer for using the app.

Along the same lines, Mike V cannot always take responsibility for the way you use the app i.e. You need to make sure that your device stays charged – if it runs out of battery and you can’t turn it on to avail the Service, Mike V cannot accept responsibility.

With respect to Mike V’s responsibility for your use of the app, when you’re using the app, it’s important to bear in mind that although we endeavour to ensure that it is updated and correct at all times, we do rely on third parties to provide information to us so that we can make it available to you. Mike V accepts no liability for any loss, direct or indirect, you experience as a result of relying wholly on this functionality of the app.

At some point, we may wish to update the app. The app is currently available on Android & iOS – the requirements for both systems(and for any additional systems we decide to extend the availability of the app to) may change, and you’ll need to download the updates if you want to keep using the app. Mike V does not promise that it will always update the app so that it is relevant to you and/or works with the Android & iOS version that you have installed on your device. However, you promise to always accept updates to the application when offered to you, We may also wish to stop providing the app, and may terminate use of it at any time without giving notice of termination to you. Unless we tell you otherwise, upon any termination, (a) the rights and licenses granted to you in these terms will end; (b) you must stop using the app, and (if needed) delete it from your device.

Changes to This Terms and Conditions

I may update our Terms and Conditions from time to time. Thus, you are advised to review this page periodically for any changes. I will notify you of any changes by posting the new Terms and Conditions on this page.

These terms and conditions are effective as of 2021-01-27

Contact Us

If you have any questions or suggestions about my Terms and Conditions, do not hesitate to contact me at micknowsbest@gmail.com.

This Terms and Conditions page was generated by App Privacy Policy Generator


Data Processing Agreement in Accordance with Article 28 of the General Data Protection Regulation (GDPR) Agreement


between


NCCS,(Norcalcustomerservices) REDACTED, 96002 Redding

- the Controller - hereafter named the "Client" -


and


Hetzner Online GmbH Gunzenhausen

- the Processor - hereafter named the "Supplier" -





1. Subject matter and duration of the Agreement or Contract


The subject matter and duration of the Agreement or Contract shall be determined entirely according to the information provided in the respective contractual relationship.

The Supplier shall process personal data for the Client in accordance with Art. 4 No. 2 and Art. 28 GDPR on the basis of this Agreement.


2. Object, nature, and purpose of the collection, processing or use of data


The object, nature and purpose of any possible collection, processing, or use of personal data, the nature of data, and the People Affected shall be described to the Supplier by the Client in accordance with Appendix 1 of this document as completed by the Client, insofar as this is not governed by the contractual relationships described the content of Section 1 of this document.

The provision of the contractually agreed upon data processing shall occur exclusively in a member state of the European Union or in another member state party to the Agreement on the European Economic Area. Any transfer to a third country shall require the prior consent of the Client and may only occur if the special conditions defined in Articles 44 et seq. of the GDPR are fulfilled.


3. Technical and organizational measures in accordance to Art. 32 GDPR (Art. 28 Para. 3 Sent. 2 Clause c of the GDPR)


(1) Before the commencement of data processing, the Supplier shall document the execution of the necessary Technical and organizational measures defined in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the Agreement or Contract, and shall present these documented measures to the Client for inspection (See Appendix 2 of this document). Upon acceptance of said documents by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement.

(2) The Supplier shall establish the security of the data in accordance with Art. 28 Para. 3 Sent. 2 Clause c, and Art. 32 GDPR in particular in conjunction with Art. 5 Para. 1 and Para. 2 GDPR. The measures to be taken are measures of data security and measures that guarantee a protection level appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems. The state of the technology; implementation costs; the nature, scope, and purposes of processing; as well as the probability of occurrence and the severity of the risk to the rights and freedoms of natural persons within the scope of Art. 32 Para. 1 GDPR must be taken into account.

(3) The technical and organizational measures shall be subject to technical progress and further development. In this respect, the Supplier is permitted to implement alternative adequate measures. The safety level of the specified measures must not be compromised. Substantial changes must be documented.


4. Correction, restriction, and deletion of data


(1) The Supplier is not entitled of his own authority to delete or restrict the processing of data processed on behalf of third parties. Insofar as an Affected Person contact the Supplier directly in this respect, the Supplier will immediately forward this request to the Client without delay.

(2) Insofar as the scope of services includes, the following are to be ensured without undue delay by the Supplier in accordance with the Client’s documented instructions: a deletion policy, the “right to be forgotten”, data correction, data portability, and data disclosure.


5. Quality assurance and other duties of the Supplier


In addition to complying with the provisions of this agreement, the Supplier shall comply with statutory obligations in accordance with Articles 28 to 33 GDPR; in this respect, the Supplier shall particularly ensure compliance with the following requirements:

  • Mrs. Margit Müller, Head of Data Protection (+49 (0)9831 505-216, data- protection@hetzner.com) is appointed to the role of Data Protection Officer by the Supplier. The Client shall be immediately notified of any change of the Data Protection Officer. The Data Protection Officer's current contact details are easily accessible on the Supplier's website.

  • Confidentiality in accordance with Art. 28 Para. 3 Sent. 2 Clause b, Art. 29 and Art. 32 Para. 4 GDPR. The Supplier entrusts only such employees with the data processing defined in this agreement who have been bound to confidentiality and have previously been familiarized with the data protection provisions relevant to their work. The Supplier and any person acting under its authority who has access to personal data may only process that data in accordance with the instructions of the Client (which includes the powers granted in this Agreement) unless otherwise required to do so by law.

  • The implementation and observance of all technical and organizational measures necessary for this Agreement in accordance with Art. 28 Para. 3 Sent. 2 Claus c, Art. 32 GDPR are specified in Appendix 2 of this Agreement.

  • The Supplier and the Client shall, upon request, cooperate with the supervisory authority in the performance of their duties.

  • The Client shall be informed immediately of any inspections and measures conducted by the supervisory authority, insofar as they relate to this Agreement or Contract. This also applies insofar as the Supplier is under investigation or is party to an investigation by a competent authority in connection with infringements to any civil or criminal law, administrative rule, or regulation regarding the processing of personal data in connection with the processing of this Agreement or Contract.

  • Insofar as the Client is subject to an inspection by the supervisory authority, an administrative or summary offence or criminal procedure, a liability claim of an Affected Person or a third party or any other claim in connection with the processing of the Agreement or Contract by the Supplier, the Supplier shall make every effort to support the Client to the best of his ability.

  • The Supplier shall regularly monitor the internal processes as well as the Technical and organizational measures to ensure that the processing in his area of responsibility is executed in accordance with the requirements of the applicable data protection law and that the rights of the Affected People are protected.

  • The Client may request documentation to verify the execution of the Technical and organizational measures taken by the Supplier in accordance with section 3 of this Agreement by completing the form at https://www.hetzner.com/AV/TOM_en.pdf.


6. Subcontracts


For the purposes of this Agreement, subcontracting relationships are defined as those services which relate directly to the provision of the principal commission. This does not include ancillary services which the Supplier uses, e.g. telecommunications services; postal/ transport services; maintenance and user support services; as well as other measures to ensure the confidentiality, availability, integrity and resilience of the hardware and software of data processing systems. However, the Supplier is obligated to make appropriate and legally binding contractual arrangements and implement appropriate inspection measures to guarantee data protection and data security of the Client's data, even in the case of outsourced ancillary services.

If the Client selects a location outside of Germany for his dedicated servers, colocation servers, and Hetzner Cloud servers, he thereby accepts the Supplier’s subcontractor as the data center operator and subcontractor at this location. A product-specific list of the subcontractors operating at each location can be found at: https://hetzner.com/AV/subcontractors.pdf.


7. The Client’s inspection rights


(1) The Client shall have the right to implement inspections in consultation with the Supplier or to have them implemented by inspectors designated in individual cases. The Client shall have the right to verify compliance with this Agreement by the Supplier in his business operations by means of spot inspections, which shall as a general rule be announced in good time.

(2) The Supplier shall ensure that the Client can verify the Supplier's compliance with the obligations under Article 28 of the GDPR. The Supplier is obligated to provide the Client with the necessary information upon request and in particular to provide proof of the implementation of the Technical and organizational measures.

(3) Evidence of such measures which concern not only this specific Agreement or Contract may be provided by compliance with approved codes of conduct pursuant to Article 40 GDPR; certification according to an approved certification procedure in accordance with Article 42 GDPR; current auditor’s certificates, reports, or excerpts from reports provided by independent bodies (e.g. an auditor, Data Protection Officer, IT security department, data privacy auditor, quality auditor); or a suitable certification by IT security or data protection auditing, e.g. according to “BSI-Grundschutz” (IT Baseline Protection certification developed by the German Federal Office for Security in Information Technology [BSI]).

(4) The Supplier may assert a claim for remuneration for enabling the Client’s inspections.


8. Communication in the case of infringement by the Supplier


(1) The Supplier shall assist the Client in complying with the obligations concerning the security of personal data, reporting requirements for data breaches, data protection impact assessments, and prior consultations referred to in Articles 32 to 36 of the GDPR. These include:

  1. Ensuring an adequate level of protection with the Technical and organizational measures that take into account the circumstances and purposes of the data processing, the projected probability and severity of potential breaches of the law due to security vulnerabilities, and measures that enable relevant breaches of the law to be detected immediately.

  2. The obligation to immediately report violations of personal data to the Client.

  3. The duty to assist the Client with regard to the Client’s own obligation to provide information to the Affected People and, in this context, to immediately inform the Client of its own obligations.

  4. Assisting the Client with his data protection impact assessment.

  5. Assisting the Client with regard to prior consultation with the supervisory authority.

(2) The Supplier may claim compensation for support services which are not included in the description of the services and which are not attributable to failures on the part of the Supplier.


9. The Client’s authority to issue instructions


(1) The Client shall immediately confirm oral instructions (at the minimum in text form).

(2) The Supplier shall inform the Client immediately if he believes that an instruction violates data protection regulations. The Supplier shall then be entitled to suspend the execution of the relevant instructions until the Client confirms or alters said instructions.


10. Deletion and return of personal data


(1) Copies or duplicates of the data shall not be created without the knowledge of the Client, with the exception of backup copies as far as they are necessary to ensure proper data processing as well as data required for compliance with statutory storage obligations.

(2) After conclusion of the contracted work, or earlier upon request by the Client, at the latest upon termination of the Service Agreement, the Supplier shall submit to the Client or – subject to prior consent – destroy all documents, processing and utilization results, and data sets related to the contract that have come into its possession in accordance with data protection law. The same applies to any and all connected test and scrap material. Upon request, the Supplier shall provide the Client with information on nature and the time of the data’s deletion.

(3) The Supplier shall retain documentation that proves that data was processed in an orderly and contractual manner after the respective contract period has elapsed in accordance with respective retention periods beyond the end of the contract. Alternatively, the Supplier may be absolved of this duty by transferring said documentation to the Client upon the termination of the contract.


11. Other agreements

11.1. Reimbursement


A fee for this contract is not required.

If the Client requires assistance in answering inquiries from Affected People as described in section 4 of this Agreement, the Client shall be required to reimburse the Supplier for such assistance.

If the Client exercises monitoring rights as described in section 7 of this Agreement, the amount of remuneration to be agreed upon will be based on the fixed hourly rate of the Supplier's employee who is instructed to supervise the auditor.

If the Client issues instructions to the Supplier as described in section 9 of this Agreement, the Client shall be required to pay any costs that result from these instructions.


11.2. Duration of contract


This Agreement is dependent on the existence of a principal contractual relationship as described in section 1 of this document. The cancellation or other termination of the principal contractual relationship as described in section 1 shall simultaneously invalidate this Agreement.

The right to isolated extraordinary notice of cancellation hereby remains intact as do statutory rights of rescission.


11.3. Choice of law


The laws of the Federal Republic of Germany shall apply.


11.4. Place of jurisdiction


The parties agree that the place of jurisdiction shall be the location of the court responsible for Gunzenhausen.


Appendix 2 of the Agreement Pursuant to Art. 28 GDPR:

Technical and Organizational Measures in Accordance with Art. 32 GDPR and Amendments


I. Confidentiality

  • Physical access control

    • Data center parks in Nürnberg, Falkenstein and Helsinki

      • electronic physical entry control system with log

      • high security perimeter fencing around the entire data center park

      • documented distribution of keys to employees and colocation customers for colocation racks (each Client only for his rack)

      • policies for accompanying and designating guests in the building

      • data center staff present 24/7

      • video monitoring at entrances and exits; security door interlocking systems and server rooms

      • For people outside of the employment of Hetzner Online GmbH (data center visitors), entrance to the building is only permitted in the company of a Hetzner Online employee.

    • Monitoring

      • electronic physical access control system with log

      • video surveillance for all entrances and exits

  • Electronic access control

    • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes

      • server passwords, which, after the initial deployment, can only be changed by Client and are not known to the Supplier

      • The Client’s password for the administration interface is determined by the Client himself; the password must comply with predefined guidelines. In addition, the Client may employ two-factor authentication to further secure his account.

    • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares

      • Access is password-protected and only employees of the Supplier have access to the passwords. Passwords must meet a minimum length, and new passwords shall be changed on a regular basis.

  • Internal access control

    • for the Supplier's internal administration systems

      • The Supplier shall prevent unauthorized access by applying security updates regularly by using state of the art technology.

      • a revision-proof, compulsory process for allocating authorization for Supplier employees

    • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes

      • The responsibility for access control is incumbent upon the Client.

    • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares

      • The Supplier shall prevent unauthorized access by applying security updates regularly by using state of the art technology.

      • a revision-proof, compulsory process for allocating authorization for Supplier employees

      • Only the Client is responsible for transferred data/software with regard to security and updates.

  • Transfer control

    • Data center parks in Nürnberg, Falkenstein and Helsinki

      • Drives that were in operation on canceled servers will be wiped (deleted) multiple times in accordance with data protection polices upon termination of the contract. After thorough testing, the wiped drives will be reused.

      • Defective drives that cannot be securely deleted shall be destroyed (shredded) directly in the Falkenstein data center.

  • Isolation control

    • for the Supplier's internal administration systems

      • Data shall be physically or logically isolated and saved separately from other data.

      • Backups of data shall also be performed using a similar system of physical or logical isolation.

    • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes

      • The Client is responsible for isolation control.

    • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares

      • Data shall be physically or logically isolated and saved separately from other data.

      • Backups of data shall also be performed using a similar system of physical or logical isolation.

  • Pseudonymization

    • The Client is responsible for pseudonymization.


II. Integrity (Art. 32 Para.1 Clause b GDPR)

  • Data transfer control

    • All employees are trained in accordance with Art. 32 Para. 4 GDPR and are obliged to ensure that personal data is handled in accordance with data protection regulations.

    • Deletion of data in accordance with data protection regulations after termination of the contract.

    • Encrypted data transmission options are provided within the scope of the service description of the principal commission.

  • Data entry control

    • for the Supplier's internal administration systems

      • Data is entered or collected by the Client.

      • Changes in data are logged.

    • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes

      • The responsibility for input control is incumbent upon the Client.

    • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares

      • Data is entered or collected by the Client.

      • Changes in data are logged.


III. Availability and Resilience (Art. 32 Para. 1 Clause b GDPR)

  • Availability control

    • for the Supplier's internal administration systems

      • backup and recovery concept with daily backups of all relevant data

      • professional employment of security programs (virus scanners, firewalls, encryption programs, spam filters)

      • employment of disk mirroring on all relevant servers

      • monitoring of all relevant servers

      • employment of an uninterruptible power supply system or emergency power supply system

      • permanently active DDoS protection

    • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes

      • Data backup is incumbent upon the Client.

      • employment of an uninterruptible power supply system or emergency power supply system

      • permanently active DDoS protection

    • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares

      • backup and recovery concept with daily backups of all relevant data depending upgon the services booked for the principal commission

      • employment of disk mirroring

      • employment of an uninterruptible power supply system or emergency power supply system

      • employment of software firewalls and restricted ports

      • permanently active DDoS protection

  • Rapid recovery measures (Art. 32 Para. 1 Clause c GDPR)

    • For all internal systems, there is a defined escalation chain which specifies who is to be informed in the event of an error in order to restore the system as quickly as possible.


IV. Procedures for regular testing, assessment, and evaluation (Art. 32 Para. 1 Clause d GDPR; Art. 25 Para. 1 GDPR)

    • The data protection management system and the information security management system have been combined into a DIMS (data protection information security management system).

    • Incident response management is available.

    • Data-protection-friendly default settings are taken into account for software development (Art. 25 Para. 2 GDPR).

  • Agreement or contract control

    • Hetzner Onling GmbH employees are regularly instructed in data protection law and are familiar with the procedural instructions and user guidelines for data processing on behalf of the Client also with regard to the Client's right of instruction. The General Terms and Conditions contain detailed information on the type and scope of the commissioned data processing and use of the Client's personal data.

    • The General Terms and Conditions contain detailed information about the purpose limitation of Client’s personal data.

    • Hetzner Online GmbH has appointed a company Data Protection Officer and an Information Security Officer. The data protection organization and the information security management systems integrate both officers into the relevant operational procedures.